General
-
Target
af387a494ed7ad95ab9c69beff077aa51ab3be3223a422172ac8818cd5999c97
-
Size
744KB
-
Sample
250120-k6691asjg1
-
MD5
9eb1941bfc7aea001691f741e7d02ba6
-
SHA1
e26f3bc51bdc59664f76df8b17ab76bfed5e2a17
-
SHA256
af387a494ed7ad95ab9c69beff077aa51ab3be3223a422172ac8818cd5999c97
-
SHA512
1e644457664c106ae08a3058ece0fa94b08bd416c5febf7a6ca577f14baf9e7d2a69247fc2719f40182ab1f9d5e397da5f1af8ec50287550dedd2269e96ce81b
-
SSDEEP
12288:4TyjXW+48qWywrU4kGFezOAVuJ5PITww7F5DO3HYffuU+xY:WIXW/8yw1ez54lIPF5SXYHui
Static task
static1
Behavioral task
behavioral1
Sample
af387a494ed7ad95ab9c69beff077aa51ab3be3223a422172ac8818cd5999c97.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
af387a494ed7ad95ab9c69beff077aa51ab3be3223a422172ac8818cd5999c97.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
af387a494ed7ad95ab9c69beff077aa51ab3be3223a422172ac8818cd5999c97
-
Size
744KB
-
MD5
9eb1941bfc7aea001691f741e7d02ba6
-
SHA1
e26f3bc51bdc59664f76df8b17ab76bfed5e2a17
-
SHA256
af387a494ed7ad95ab9c69beff077aa51ab3be3223a422172ac8818cd5999c97
-
SHA512
1e644457664c106ae08a3058ece0fa94b08bd416c5febf7a6ca577f14baf9e7d2a69247fc2719f40182ab1f9d5e397da5f1af8ec50287550dedd2269e96ce81b
-
SSDEEP
12288:4TyjXW+48qWywrU4kGFezOAVuJ5PITww7F5DO3HYffuU+xY:WIXW/8yw1ez54lIPF5SXYHui
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7