General

  • Target

    installer.exe

  • Size

    241KB

  • Sample

    250413-gszq8azpt3

  • MD5

    b3004a21d724c3a634bd9411b8628713

  • SHA1

    119c7a16e2e2e2689e8a376b97bec6a80fd6b3fc

  • SHA256

    66e59f5c1780a57b6c267f84a71a901c64321607fc4d06714f6c0a6e89b075d7

  • SHA512

    2c4c1caac46bab3bee953dd6105db034a6b52946ed566d4b5a84aa3aea48318db0452891ab931bef10d13677b12e91f197052a19281fb8baedfa802a6ce3b951

  • SSDEEP

    3072:iLtFhVdQjEkzKd6SCs0be9RDcGg5aL2/QzfuruwSg1YyRyaAlYLC1ERXEqYPhVd9:AVdQjEzFV2DM2OWYGyLlYW2uKBOcAUS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      installer.exe

    • Size

      241KB

    • MD5

      b3004a21d724c3a634bd9411b8628713

    • SHA1

      119c7a16e2e2e2689e8a376b97bec6a80fd6b3fc

    • SHA256

      66e59f5c1780a57b6c267f84a71a901c64321607fc4d06714f6c0a6e89b075d7

    • SHA512

      2c4c1caac46bab3bee953dd6105db034a6b52946ed566d4b5a84aa3aea48318db0452891ab931bef10d13677b12e91f197052a19281fb8baedfa802a6ce3b951

    • SSDEEP

      3072:iLtFhVdQjEkzKd6SCs0be9RDcGg5aL2/QzfuruwSg1YyRyaAlYLC1ERXEqYPhVd9:AVdQjEzFV2DM2OWYGyLlYW2uKBOcAUS

    • Modifies firewall policy service

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks