General

  • Target

    9869ccef5fb87ce60879d541599377f0_NEAS

  • Size

    283KB

  • Sample

    240507-jrd48sfe6x

  • MD5

    9869ccef5fb87ce60879d541599377f0

  • SHA1

    b05627f7fc120fdd27ddcff736ab8d256bcb3470

  • SHA256

    1a2c2e6332879dd2d47a3c1cdb68f2cdc722b1fc72963d97f921bb656271d34b

  • SHA512

    cf1971586c50a508433d04dd0ca5721036e8408624709b96b41f883349d63a4e6abf3d96d710e24d8c228e7c959b588a7dc99bc8701ed51561b6a402de30fd56

  • SSDEEP

    6144:TvEk52U+T6i5LirrllHy4HUcMQY6bjwzVdUsBbr/5t:TEk5N+T5xYrllrU7QY6PwzX/P

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      9869ccef5fb87ce60879d541599377f0_NEAS

    • Size

      283KB

    • MD5

      9869ccef5fb87ce60879d541599377f0

    • SHA1

      b05627f7fc120fdd27ddcff736ab8d256bcb3470

    • SHA256

      1a2c2e6332879dd2d47a3c1cdb68f2cdc722b1fc72963d97f921bb656271d34b

    • SHA512

      cf1971586c50a508433d04dd0ca5721036e8408624709b96b41f883349d63a4e6abf3d96d710e24d8c228e7c959b588a7dc99bc8701ed51561b6a402de30fd56

    • SSDEEP

      6144:TvEk52U+T6i5LirrllHy4HUcMQY6bjwzVdUsBbr/5t:TEk5N+T5xYrllrU7QY6PwzX/P

    • Detects BazaLoader malware

      BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Modifies visiblity of hidden/system files in Explorer

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Modifies Installed Components in the registry

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks