General

  • Target

    5e2c8cdf667c37ef31ae07af5375972238f6db9357fba0bbbb7943052c988677

  • Size

    3.8MB

  • Sample

    240615-1y8e4azgkl

  • MD5

    97aa8f62fd051306841c893b51728dfb

  • SHA1

    570e52e5e168a8f41e52a4bfdf9f3b8d16cb6610

  • SHA256

    5e2c8cdf667c37ef31ae07af5375972238f6db9357fba0bbbb7943052c988677

  • SHA512

    3779254d60df0f09719858bbfd56df074178034889c5c5475917c1408dcb735b73d634be52527e19d35fe8d623ea436dfd8f8d016307ed05b9ce5ebb14b8c00e

  • SSDEEP

    98304:5Vtk87VymQSv/fHR8ea3Mg6pswjzRGL7GX0cdZ3ldGGJ:5Vh7LQSfxrMks4EGkcdZGE

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      5e2c8cdf667c37ef31ae07af5375972238f6db9357fba0bbbb7943052c988677

    • Size

      3.8MB

    • MD5

      97aa8f62fd051306841c893b51728dfb

    • SHA1

      570e52e5e168a8f41e52a4bfdf9f3b8d16cb6610

    • SHA256

      5e2c8cdf667c37ef31ae07af5375972238f6db9357fba0bbbb7943052c988677

    • SHA512

      3779254d60df0f09719858bbfd56df074178034889c5c5475917c1408dcb735b73d634be52527e19d35fe8d623ea436dfd8f8d016307ed05b9ce5ebb14b8c00e

    • SSDEEP

      98304:5Vtk87VymQSv/fHR8ea3Mg6pswjzRGL7GX0cdZ3ldGGJ:5Vh7LQSfxrMks4EGkcdZGE

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Modify Registry

5
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Virtualization/Sandbox Evasion

1
T1497

Tasks