General
-
Target
00002475ff8f62ef167ae0ca564bc206e1dcb1549fc14fae5c35fb65b66fd35f
-
Size
464KB
-
Sample
250203-wxv16aypay
-
MD5
59b5e5a7547053f923963a56a8b7bdbf
-
SHA1
4c3ce8f1d16639b82b3556c3f3665d83949415d2
-
SHA256
00002475ff8f62ef167ae0ca564bc206e1dcb1549fc14fae5c35fb65b66fd35f
-
SHA512
f43c79e0335b418f0ca88ede9ccd9fcf3f25737cb34e3c56be6fd17ccde9da805f240063d1030079f68d3f8d2f302fc213055453803004f55fa7a0dc14a7d4f4
-
SSDEEP
6144:5afsiuvAQ+tTm6cyERSiytj71cwE4jKS6vlxQqyRqpYNLA:uCvAQ+q6ctRt636wfjOHm1c
Static task
static1
Behavioral task
behavioral1
Sample
00002475ff8f62ef167ae0ca564bc206e1dcb1549fc14fae5c35fb65b66fd35f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00002475ff8f62ef167ae0ca564bc206e1dcb1549fc14fae5c35fb65b66fd35f.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
00002475ff8f62ef167ae0ca564bc206e1dcb1549fc14fae5c35fb65b66fd35f
-
Size
464KB
-
MD5
59b5e5a7547053f923963a56a8b7bdbf
-
SHA1
4c3ce8f1d16639b82b3556c3f3665d83949415d2
-
SHA256
00002475ff8f62ef167ae0ca564bc206e1dcb1549fc14fae5c35fb65b66fd35f
-
SHA512
f43c79e0335b418f0ca88ede9ccd9fcf3f25737cb34e3c56be6fd17ccde9da805f240063d1030079f68d3f8d2f302fc213055453803004f55fa7a0dc14a7d4f4
-
SSDEEP
6144:5afsiuvAQ+tTm6cyERSiytj71cwE4jKS6vlxQqyRqpYNLA:uCvAQ+q6ctRt636wfjOHm1c
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1