General

  • Target

    21774c4738539daf6f2e348afe5159d9a5e8e85b034acb239176ce27bebffb9c

  • Size

    232KB

  • Sample

    241009-kbv89aydkr

  • MD5

    1240c2b02ccf18357e1bff94f0b4afdc

  • SHA1

    62dba22a7214051e7f6d21df13dca10d551364ce

  • SHA256

    21774c4738539daf6f2e348afe5159d9a5e8e85b034acb239176ce27bebffb9c

  • SHA512

    8c357fd51281e9954fa8a654fe2f7c150624c05646fcb29e547df84cb3b6fcd05b92e192e2dd7c1027e246dfaae671e0f67f6300d21f92cafdb239bc96c9161a

  • SSDEEP

    3072:Wn+htWMtf+7GZYGVA2QJgi8xJLDoUiLGCHObD+g6jBRnRvtrmBT0FHm:oEGqZYGVd82PD2yLIRnBtaBTcG

Malware Config

Extracted

Family

bdaejec

C2

ddos.dnsnb8.net

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      21774c4738539daf6f2e348afe5159d9a5e8e85b034acb239176ce27bebffb9c

    • Size

      232KB

    • MD5

      1240c2b02ccf18357e1bff94f0b4afdc

    • SHA1

      62dba22a7214051e7f6d21df13dca10d551364ce

    • SHA256

      21774c4738539daf6f2e348afe5159d9a5e8e85b034acb239176ce27bebffb9c

    • SHA512

      8c357fd51281e9954fa8a654fe2f7c150624c05646fcb29e547df84cb3b6fcd05b92e192e2dd7c1027e246dfaae671e0f67f6300d21f92cafdb239bc96c9161a

    • SSDEEP

      3072:Wn+htWMtf+7GZYGVA2QJgi8xJLDoUiLGCHObD+g6jBRnRvtrmBT0FHm:oEGqZYGVd82PD2yLIRnBtaBTcG

    • Bdaejec

      Bdaejec is a backdoor written in C++.

    • Detects Bdaejec Backdoor.

      Bdaejec is backdoor written in C++.

    • FatalRat

      FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Fatal Rat payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks