General

  • Target

    2024-12-16_352e3e4ec84a805faf4f6df1d7b22e7e_luca-stealer_magniber

  • Size

    1.9MB

  • Sample

    241216-qcdy9a1lez

  • MD5

    352e3e4ec84a805faf4f6df1d7b22e7e

  • SHA1

    b5aa177c439898fe57a5e0af16fd5f6001020e38

  • SHA256

    00797b000f2387f19e4a3bba5eff419b8012fc82935f25b27c2025c9b3ce0dbe

  • SHA512

    204f4b26f947d6739a2049d48043a1ee9285a257c2cf17dca2f0d0883673a79140b12cd8da6e89d68298ff32dbb8d56e12a282b126fb935194a97594c9ee541e

  • SSDEEP

    49152:MRNRearsd4ANTlYwoXlPY5fAms9cC/VYE5/:wfeOsvNSXlPY5f7CJ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2024-12-16_352e3e4ec84a805faf4f6df1d7b22e7e_luca-stealer_magniber

    • Size

      1.9MB

    • MD5

      352e3e4ec84a805faf4f6df1d7b22e7e

    • SHA1

      b5aa177c439898fe57a5e0af16fd5f6001020e38

    • SHA256

      00797b000f2387f19e4a3bba5eff419b8012fc82935f25b27c2025c9b3ce0dbe

    • SHA512

      204f4b26f947d6739a2049d48043a1ee9285a257c2cf17dca2f0d0883673a79140b12cd8da6e89d68298ff32dbb8d56e12a282b126fb935194a97594c9ee541e

    • SSDEEP

      49152:MRNRearsd4ANTlYwoXlPY5fAms9cC/VYE5/:wfeOsvNSXlPY5f7CJ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks