General

  • Target

    dfbd8e7897b20e935aaf3f9a54e2a2f4054b11d2724f9d1a12510a500b89d01b

  • Size

    1.8MB

  • Sample

    250107-k9zz4awpgp

  • MD5

    c17115f4df684c8f589c55b6145dea51

  • SHA1

    983753c8ccfd52ad49883347c2beb9c058d3b83f

  • SHA256

    dfbd8e7897b20e935aaf3f9a54e2a2f4054b11d2724f9d1a12510a500b89d01b

  • SHA512

    12f276d17d25165c94780d5238f15fc70a350801c5f55a726ecc4d121f0819ebe0dae66c6f82a4fd818242e994536ad1fba4992bf4a35cc8904482a3b9bcb311

  • SSDEEP

    49152:J5yqxOz7oqGsL4Oc+jUuKr3CTQF7Gwpi0dim:J9xOPXGE4qUuCCT+frgm

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      dfbd8e7897b20e935aaf3f9a54e2a2f4054b11d2724f9d1a12510a500b89d01b

    • Size

      1.8MB

    • MD5

      c17115f4df684c8f589c55b6145dea51

    • SHA1

      983753c8ccfd52ad49883347c2beb9c058d3b83f

    • SHA256

      dfbd8e7897b20e935aaf3f9a54e2a2f4054b11d2724f9d1a12510a500b89d01b

    • SHA512

      12f276d17d25165c94780d5238f15fc70a350801c5f55a726ecc4d121f0819ebe0dae66c6f82a4fd818242e994536ad1fba4992bf4a35cc8904482a3b9bcb311

    • SSDEEP

      49152:J5yqxOz7oqGsL4Oc+jUuKr3CTQF7Gwpi0dim:J9xOPXGE4qUuCCT+frgm

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • UAC bypass

    • Windows security bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks