General

  • Target

    e3f75ff4efc39a4afa3b1e35bae5298c1405018c31339a9c4142f75789d3013aN.exe

  • Size

    232KB

  • Sample

    250112-p1jc7svpfq

  • MD5

    cc804131d5439bbc89323f02d7ece850

  • SHA1

    f0644c93b27c1fd7980ba5175ef63872d675479d

  • SHA256

    e3f75ff4efc39a4afa3b1e35bae5298c1405018c31339a9c4142f75789d3013a

  • SHA512

    0921ed4a96afd63542c76d3dc665ddc7847a62b206778e157b1825af5383089e7b5fa974320418f824054b34fdf326fc3c3d20785aa149420813a0b732d5e9a8

  • SSDEEP

    3072:rr8WCBvMsUCZfXyg6mB9NGtkaeDSBo822rUAqOVY5xu+RxF2ZWuqoOa2TRxFY4j0:nKppUCFfXiaXSBzrUpuyFbue/FY4j0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      e3f75ff4efc39a4afa3b1e35bae5298c1405018c31339a9c4142f75789d3013aN.exe

    • Size

      232KB

    • MD5

      cc804131d5439bbc89323f02d7ece850

    • SHA1

      f0644c93b27c1fd7980ba5175ef63872d675479d

    • SHA256

      e3f75ff4efc39a4afa3b1e35bae5298c1405018c31339a9c4142f75789d3013a

    • SHA512

      0921ed4a96afd63542c76d3dc665ddc7847a62b206778e157b1825af5383089e7b5fa974320418f824054b34fdf326fc3c3d20785aa149420813a0b732d5e9a8

    • SSDEEP

      3072:rr8WCBvMsUCZfXyg6mB9NGtkaeDSBo822rUAqOVY5xu+RxF2ZWuqoOa2TRxFY4j0:nKppUCFfXiaXSBzrUpuyFbue/FY4j0

    • Detect Neshta payload

    • Modifies firewall policy service

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • Neshta family

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks