General

  • Target

    431d587a9daa3cadc68140b06600a4875854bfcaaf60a4c268e48e406e7c2c92

  • Size

    416KB

  • Sample

    221205-qx977ahg2t

  • MD5

    5adce2ddaba8eddeae1c5e76bc474cda

  • SHA1

    3811acce6e4597422c386e957c4d90dae11fcc6a

  • SHA256

    431d587a9daa3cadc68140b06600a4875854bfcaaf60a4c268e48e406e7c2c92

  • SHA512

    ad020dd663d53ccf688a58dd25659d18b31a552c23327959ff8d0088acc1306199378e50b562ee9e9ac0f4f64baf3e072a1cf1ce615f958833e97718da7f1362

  • SSDEEP

    12288:NeUWe6P/qH9ioFOt4hmUS8QGz5jUyyaj40:NeUO/qXIt1FGz9UPU

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      431d587a9daa3cadc68140b06600a4875854bfcaaf60a4c268e48e406e7c2c92

    • Size

      416KB

    • MD5

      5adce2ddaba8eddeae1c5e76bc474cda

    • SHA1

      3811acce6e4597422c386e957c4d90dae11fcc6a

    • SHA256

      431d587a9daa3cadc68140b06600a4875854bfcaaf60a4c268e48e406e7c2c92

    • SHA512

      ad020dd663d53ccf688a58dd25659d18b31a552c23327959ff8d0088acc1306199378e50b562ee9e9ac0f4f64baf3e072a1cf1ce615f958833e97718da7f1362

    • SSDEEP

      12288:NeUWe6P/qH9ioFOt4hmUS8QGz5jUyyaj40:NeUO/qXIt1FGz9UPU

    • Modifies firewall policy service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks