General

  • Target

    f403f9f1c65251f0b030de3d426263d083fa32ffbd2d375f9b6386eb53e9ba39

  • Size

    14.8MB

  • Sample

    241226-t7a3ma1lhl

  • MD5

    8be5ce8cea8d9f24f569bd47765de87f

  • SHA1

    a3969d04faa5d186a530283329071a375c83ab97

  • SHA256

    f403f9f1c65251f0b030de3d426263d083fa32ffbd2d375f9b6386eb53e9ba39

  • SHA512

    ee282e2c93a8a48c1a85281077d0be9903baa1a62bf15902b0a25af46f9d4973ff4b9ada212f8dc8fd0faa589221401a8138d3892e1b44b97d28516404a04113

  • SSDEEP

    196608:fgA3UoPtKLBSIkMmf5XPmImn/2gpi08QukGZl9lEL38NlxgjewYk1jrMX+5j6txt:YAkolIBShMwu+2ukmoKlxgjewXmxD35v

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      f403f9f1c65251f0b030de3d426263d083fa32ffbd2d375f9b6386eb53e9ba39

    • Size

      14.8MB

    • MD5

      8be5ce8cea8d9f24f569bd47765de87f

    • SHA1

      a3969d04faa5d186a530283329071a375c83ab97

    • SHA256

      f403f9f1c65251f0b030de3d426263d083fa32ffbd2d375f9b6386eb53e9ba39

    • SHA512

      ee282e2c93a8a48c1a85281077d0be9903baa1a62bf15902b0a25af46f9d4973ff4b9ada212f8dc8fd0faa589221401a8138d3892e1b44b97d28516404a04113

    • SSDEEP

      196608:fgA3UoPtKLBSIkMmf5XPmImn/2gpi08QukGZl9lEL38NlxgjewYk1jrMX+5j6txt:YAkolIBShMwu+2ukmoKlxgjewXmxD35v

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks