General

  • Target

    e264f8835236ba69a65ee098b5b55db60b258e130720521ee2f87edaa412c525

  • Size

    649KB

  • Sample

    221011-v4n1raffc3

  • MD5

    65001e6d6cf125d88f272c004aabfbd0

  • SHA1

    7710729d91acc8f935e1246db107ff8aa122bb34

  • SHA256

    e264f8835236ba69a65ee098b5b55db60b258e130720521ee2f87edaa412c525

  • SHA512

    b19e1e366c1a5c6aca686f80eeaeb56af7b642b8ffa1c29ad18cf3168373a929deee7af9c3ed7e82870f32771d76cffb09e821b3a2067b584bc82637365d9fee

  • SSDEEP

    12288:16HAJpG7zGyB3KnlvwLI3hKkxa0mUW+sl7HowPm1n0ix3XqGt:16AM7zGqKJwLI3V2IOc1rhp

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      e264f8835236ba69a65ee098b5b55db60b258e130720521ee2f87edaa412c525

    • Size

      649KB

    • MD5

      65001e6d6cf125d88f272c004aabfbd0

    • SHA1

      7710729d91acc8f935e1246db107ff8aa122bb34

    • SHA256

      e264f8835236ba69a65ee098b5b55db60b258e130720521ee2f87edaa412c525

    • SHA512

      b19e1e366c1a5c6aca686f80eeaeb56af7b642b8ffa1c29ad18cf3168373a929deee7af9c3ed7e82870f32771d76cffb09e821b3a2067b584bc82637365d9fee

    • SSDEEP

      12288:16HAJpG7zGyB3KnlvwLI3hKkxa0mUW+sl7HowPm1n0ix3XqGt:16AM7zGqKJwLI3V2IOc1rhp

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Windows security modification

    • Accesses Microsoft Outlook accounts

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks