General

  • Target

    53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe

  • Size

    576KB

  • Sample

    241216-nb1eraxqev

  • MD5

    e75eb7ec59b063d003c27d6a7beb0cb0

  • SHA1

    fd6b271010e01f5a63766dfabc23d96eb6cabdc8

  • SHA256

    53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849

  • SHA512

    6ec26ad4969758a619dba4755fd92c035d790cbcf7ce795daf647c54e9e3c074ee706b2505780f956d48a9fbc0c4c8fe7106974a0a4898e24820aee625899ad0

  • SSDEEP

    3072:Wo/L5tpV+CSA1AAPoCpxW5ATBfUNjpS1svkTVC9FieYTTLprx/m3qT4S826guKqf:DtpvoCpcNQ1jQdiJKFRvA+npAJkYEnr

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849N.exe

    • Size

      576KB

    • MD5

      e75eb7ec59b063d003c27d6a7beb0cb0

    • SHA1

      fd6b271010e01f5a63766dfabc23d96eb6cabdc8

    • SHA256

      53824a6cb81f4652afd8b5bec0acb9e6169424cf889ccdb0e0763384026f8849

    • SHA512

      6ec26ad4969758a619dba4755fd92c035d790cbcf7ce795daf647c54e9e3c074ee706b2505780f956d48a9fbc0c4c8fe7106974a0a4898e24820aee625899ad0

    • SSDEEP

      3072:Wo/L5tpV+CSA1AAPoCpxW5ATBfUNjpS1svkTVC9FieYTTLprx/m3qT4S826guKqf:DtpvoCpcNQ1jQdiJKFRvA+npAJkYEnr

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks