General

  • Target

    a07f695718f9e4da6083aa495c68b7e2b0490c7f485859ee54267fc9e537b991

  • Size

    144KB

  • Sample

    221030-slf63sgfbl

  • MD5

    81b177353700fe0b281553164542edb5

  • SHA1

    71e5049e4959a698861af9b8a5874437016bfac6

  • SHA256

    a07f695718f9e4da6083aa495c68b7e2b0490c7f485859ee54267fc9e537b991

  • SHA512

    268e8eba6a1c882c29ee556bae6e6b84cf8f3fedacdbd2dcaec7d53728385b1a37c351bacea1ed98ff5e56a9cfeebab04480f23d8e655628b8deda11dd517dd4

  • SSDEEP

    3072:EGSGJnvd4kI4Q0LDLG/cY4pUAQIkXCrCwTh6xS9TWqmROod:XC903Lcn4JQI1rC+9T5YOI

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Extracted

Family

xtremerat

C2

xstremaa.no-ip.info

Targets

    • Target

      a07f695718f9e4da6083aa495c68b7e2b0490c7f485859ee54267fc9e537b991

    • Size

      144KB

    • MD5

      81b177353700fe0b281553164542edb5

    • SHA1

      71e5049e4959a698861af9b8a5874437016bfac6

    • SHA256

      a07f695718f9e4da6083aa495c68b7e2b0490c7f485859ee54267fc9e537b991

    • SHA512

      268e8eba6a1c882c29ee556bae6e6b84cf8f3fedacdbd2dcaec7d53728385b1a37c351bacea1ed98ff5e56a9cfeebab04480f23d8e655628b8deda11dd517dd4

    • SSDEEP

      3072:EGSGJnvd4kI4Q0LDLG/cY4pUAQIkXCrCwTh6xS9TWqmROod:XC903Lcn4JQI1rC+9T5YOI

    • Detect XtremeRAT payload

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • XtremeRAT

      The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks