General

  • Target

    82625d3ec756ae606b729ab6e90c706dd57a83e807e87b06dd3205bdd3638752.exe

  • Size

    564KB

  • Sample

    250119-tr7fwswlhn

  • MD5

    93372c9ac519f7fdc0a9aa967c01cf59

  • SHA1

    87434cbe70d2eecd737912a529bbf0e2599ceb45

  • SHA256

    82625d3ec756ae606b729ab6e90c706dd57a83e807e87b06dd3205bdd3638752

  • SHA512

    c39a4311cfd80df56a906d931362603f7bbeceab5c424d78593214325902017385a3ac552bdbd433b0cf11d8c89f83eab9a2d89f56f1ed585d75b02ebbfcdbc5

  • SSDEEP

    12288:tehnaNPpSVZmNxRCwnwm3W3OHIIf5m9RhWFVg:teh0PpS6NxNnwYeOHXAhWTg

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      82625d3ec756ae606b729ab6e90c706dd57a83e807e87b06dd3205bdd3638752.exe

    • Size

      564KB

    • MD5

      93372c9ac519f7fdc0a9aa967c01cf59

    • SHA1

      87434cbe70d2eecd737912a529bbf0e2599ceb45

    • SHA256

      82625d3ec756ae606b729ab6e90c706dd57a83e807e87b06dd3205bdd3638752

    • SHA512

      c39a4311cfd80df56a906d931362603f7bbeceab5c424d78593214325902017385a3ac552bdbd433b0cf11d8c89f83eab9a2d89f56f1ed585d75b02ebbfcdbc5

    • SSDEEP

      12288:tehnaNPpSVZmNxRCwnwm3W3OHIIf5m9RhWFVg:teh0PpS6NxNnwYeOHXAhWTg

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Ramnit family

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks