General

  • Target

    7d4b3b7b052e2b296a24aadb95127191b717f4ba52853f21231241d8c0877bc4N.exe

  • Size

    3.1MB

  • Sample

    250111-fk53laxpbk

  • MD5

    9c580391a930dd9a31ee8261b5d3cce0

  • SHA1

    1239b6aa65563304efe387021eec0bc26290a7f1

  • SHA256

    7d4b3b7b052e2b296a24aadb95127191b717f4ba52853f21231241d8c0877bc4

  • SHA512

    54cf4fec7c756ee4dc7c7de194a86519a8ffe384cc944ed08dfe395e211e93f28d4feb404448e4db390583c4d36aed1cd8df7fce08927f3a91fc7f073db3865b

  • SSDEEP

    49152:7crynO1MjEgjIsOzbrANo0ZQLkx5gNXcZ3BC/Uu+g4LeFTLTMQToPWAG:wr08vgjxOzgUkx0cPzLUHT7TLAG

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Targets

    • Target

      7d4b3b7b052e2b296a24aadb95127191b717f4ba52853f21231241d8c0877bc4N.exe

    • Size

      3.1MB

    • MD5

      9c580391a930dd9a31ee8261b5d3cce0

    • SHA1

      1239b6aa65563304efe387021eec0bc26290a7f1

    • SHA256

      7d4b3b7b052e2b296a24aadb95127191b717f4ba52853f21231241d8c0877bc4

    • SHA512

      54cf4fec7c756ee4dc7c7de194a86519a8ffe384cc944ed08dfe395e211e93f28d4feb404448e4db390583c4d36aed1cd8df7fce08927f3a91fc7f073db3865b

    • SSDEEP

      49152:7crynO1MjEgjIsOzbrANo0ZQLkx5gNXcZ3BC/Uu+g4LeFTLTMQToPWAG:wr08vgjxOzgUkx0cPzLUHT7TLAG

    • Amadey

      Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

    • Amadey family

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks