General

  • Target

    4a57e9d4f8911e67ef0eef1b81749dc0N.exe

  • Size

    341KB

  • Sample

    240718-cb3pbstard

  • MD5

    4a57e9d4f8911e67ef0eef1b81749dc0

  • SHA1

    384fce9d051e1943eec789164dd3139c48825270

  • SHA256

    a390fd48a51775634960a05a3550f91762027f9f70089633969bc9e5f9ffd189

  • SHA512

    3567c67c6bf4866f87d8b40034cf3ec99133b9b0824629dc5726c19687ca0cd767493285a7adc7329b5ff060464774f725b5379514bfdab0898b0626d66784b8

  • SSDEEP

    6144:lVO96GnU/tSGzH/180RodXpthkB9liJDaj0KghFWccQTOes3:LOtU/1H/+0RiXpvkBCVaRghvcQTOeM

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Extracted

Family

mylobot

C2

eakalra.ru:1281

op17.ru:6006

ashfkwu.ru:9821

pomplus.ru:7372

fasefja.ru:3410

hpifnad.ru:3721

benkofx.ru:3333

fpzskbx.ru:9364

ouxtjzd.ru:8658

schwpxp.ru:2956

pspkgya.ru:2675

lmlwtdm.ru:2768

rzwnsph.ru:5898

awtiwzk.ru:9816

pzljenb.ru:3486

yhjtpyf.ru:3565

ogkbsoq.ru:2553

rjngcbj.ru:5655

jlfeopz.ru:4698

wqcruiz.ru:2165

Targets

    • Target

      4a57e9d4f8911e67ef0eef1b81749dc0N.exe

    • Size

      341KB

    • MD5

      4a57e9d4f8911e67ef0eef1b81749dc0

    • SHA1

      384fce9d051e1943eec789164dd3139c48825270

    • SHA256

      a390fd48a51775634960a05a3550f91762027f9f70089633969bc9e5f9ffd189

    • SHA512

      3567c67c6bf4866f87d8b40034cf3ec99133b9b0824629dc5726c19687ca0cd767493285a7adc7329b5ff060464774f725b5379514bfdab0898b0626d66784b8

    • SSDEEP

      6144:lVO96GnU/tSGzH/180RodXpthkB9liJDaj0KghFWccQTOes3:LOtU/1H/+0RiXpvkBCVaRghvcQTOeM

    • Modifies firewall policy service

    • Mylobot

      Botnet which first appeared in 2017 written in C++.

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Deletes itself

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks