General

  • Target

    772a15fe0d9e560f0bb614ccae0d9390N.exe

  • Size

    386KB

  • Sample

    240722-htm99atgqn

  • MD5

    772a15fe0d9e560f0bb614ccae0d9390

  • SHA1

    7775d19c00eeb191f7e8cbbb7e33629c73f29f2d

  • SHA256

    fba8ea4fa581c0c8addf50add60f7e8e48cfdb4d5908e7caaabbabe7279eaf2f

  • SHA512

    7e78df28ad82a7de644a4de141f8b73dca77493b4da8228b231b04d01f651ce4029fec55c9da669363b0c67b4f52f3592557555cdc42744c0e7f7cc5ff54d94e

  • SSDEEP

    12288:E+YcUc6SBLLTSEgBAnhc1kGsxQqxemT6OhJ:Ev2BLHSn6q1BnSJ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      772a15fe0d9e560f0bb614ccae0d9390N.exe

    • Size

      386KB

    • MD5

      772a15fe0d9e560f0bb614ccae0d9390

    • SHA1

      7775d19c00eeb191f7e8cbbb7e33629c73f29f2d

    • SHA256

      fba8ea4fa581c0c8addf50add60f7e8e48cfdb4d5908e7caaabbabe7279eaf2f

    • SHA512

      7e78df28ad82a7de644a4de141f8b73dca77493b4da8228b231b04d01f651ce4029fec55c9da669363b0c67b4f52f3592557555cdc42744c0e7f7cc5ff54d94e

    • SSDEEP

      12288:E+YcUc6SBLLTSEgBAnhc1kGsxQqxemT6OhJ:Ev2BLHSn6q1BnSJ

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks