General

  • Target

    game-11-islands-story-of-loveSetup.exe

  • Size

    167KB

  • Sample

    250316-2nvlxs1zav

  • MD5

    0d792b22e6631e0aa21d806ab41ca262

  • SHA1

    0248a68fe072e51d80a125bb687bb52555cee59a

  • SHA256

    53a1eebbb64c49252cd29f5bf5b3d652c73ad7bf3116bbd1e17d1e1fa36c863a

  • SHA512

    ae0337dd76c017809a0ee78dd3ac067c8a9c9f94e9a8a9d4dbf929d7614cc8ac39b9d86607d704b553225fc9c2c459c38f550d27ef416095434c0b68c6997efd

  • SSDEEP

    3072:/Lk39+hYXJxDf1uP5a+YS0otaQ9mEUG7fIhF1+QGHVLi4Tn7Kx8zynfIuDpkos:/QvHDf1uE9msQ9mEJ4zq1e43Kx8zcfIz

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      game-11-islands-story-of-loveSetup.exe

    • Size

      167KB

    • MD5

      0d792b22e6631e0aa21d806ab41ca262

    • SHA1

      0248a68fe072e51d80a125bb687bb52555cee59a

    • SHA256

      53a1eebbb64c49252cd29f5bf5b3d652c73ad7bf3116bbd1e17d1e1fa36c863a

    • SHA512

      ae0337dd76c017809a0ee78dd3ac067c8a9c9f94e9a8a9d4dbf929d7614cc8ac39b9d86607d704b553225fc9c2c459c38f550d27ef416095434c0b68c6997efd

    • SSDEEP

      3072:/Lk39+hYXJxDf1uP5a+YS0otaQ9mEUG7fIhF1+QGHVLi4Tn7Kx8zynfIuDpkos:/QvHDf1uE9msQ9mEJ4zq1e43Kx8zcfIz

    • Banload

      Banload variants download malicious files, then install and execute the files.

    • Banload family

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks