General

  • Target

    2024-12-24_94c04b7212c8e78ec291bcc43fd27483_hijackloader_luca-stealer_magniber

  • Size

    1.4MB

  • Sample

    241224-p5bh6axrhj

  • MD5

    94c04b7212c8e78ec291bcc43fd27483

  • SHA1

    8a0aa7549a292640b524291d25588c1ab815101b

  • SHA256

    3ff795f882ebabb8fcc9ab35147a9099b03f446571b283199d7a16d027eeacee

  • SHA512

    3398d375acacdddf14f5e532a0a75daf3f5c10337c1c2e5adfc0b5c37e25bc7ce909c810a398e9399bb72c02213d6645640fe9658acd1e56e368078934e25b8d

  • SSDEEP

    24576:cnjyRp5qe3YBRvcuI+bS4+GhqKbHybN7U8224SqDExhRv4eU18RCQaf9QzN5HOj0:cnjyRp5qeivc1+lQYON54SD9v4eU18Rh

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2024-12-24_94c04b7212c8e78ec291bcc43fd27483_hijackloader_luca-stealer_magniber

    • Size

      1.4MB

    • MD5

      94c04b7212c8e78ec291bcc43fd27483

    • SHA1

      8a0aa7549a292640b524291d25588c1ab815101b

    • SHA256

      3ff795f882ebabb8fcc9ab35147a9099b03f446571b283199d7a16d027eeacee

    • SHA512

      3398d375acacdddf14f5e532a0a75daf3f5c10337c1c2e5adfc0b5c37e25bc7ce909c810a398e9399bb72c02213d6645640fe9658acd1e56e368078934e25b8d

    • SSDEEP

      24576:cnjyRp5qe3YBRvcuI+bS4+GhqKbHybN7U8224SqDExhRv4eU18RCQaf9QzN5HOj0:cnjyRp5qeivc1+lQYON54SD9v4eU18Rh

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks