General

  • Target

    80e642dd7e4230a29731756515022aa2c5ec2324d0205fd6eb0d86b96a08f060

  • Size

    2.5MB

  • Sample

    250109-dsb4dawkfs

  • MD5

    7d34fda9c89105cfd5c99260061b0642

  • SHA1

    b0249486724a6777cec133bb3818900378fec31c

  • SHA256

    80e642dd7e4230a29731756515022aa2c5ec2324d0205fd6eb0d86b96a08f060

  • SHA512

    574aca7696402594c44180f24352b7ce5258a58879ac7a795bac0f4a5c3b73f15fcba7f6b04c7119b15107dffec076ab25dfc95d3630e1c7e5301c492667b7b1

  • SSDEEP

    49152:crenjNJBfl7UGDxNug/EQ85aaKAdtl0Wf+:0eD7XV+9asT+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      80e642dd7e4230a29731756515022aa2c5ec2324d0205fd6eb0d86b96a08f060

    • Size

      2.5MB

    • MD5

      7d34fda9c89105cfd5c99260061b0642

    • SHA1

      b0249486724a6777cec133bb3818900378fec31c

    • SHA256

      80e642dd7e4230a29731756515022aa2c5ec2324d0205fd6eb0d86b96a08f060

    • SHA512

      574aca7696402594c44180f24352b7ce5258a58879ac7a795bac0f4a5c3b73f15fcba7f6b04c7119b15107dffec076ab25dfc95d3630e1c7e5301c492667b7b1

    • SSDEEP

      49152:crenjNJBfl7UGDxNug/EQ85aaKAdtl0Wf+:0eD7XV+9asT+

    • Detect Neshta payload

    • Modifies firewall policy service

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks