General

  • Target

    SecuriteInfo.com.Win32.Sector.30.16924.15564

  • Size

    1.1MB

  • Sample

    200730-t5vy5kfr72

  • MD5

    9940b1d4284582df2342b9c394b34d20

  • SHA1

    ffe310f517cc7e6e7dc6ca10007338b2c1d09f66

  • SHA256

    087df168d78dcfd730fb669aad4b848c054f08cbab3c722c87a0be0aa5c598a7

  • SHA512

    b578d6c3a27f56d85ddeadcc8f96a40c3aa4c64684d9d0451769233997c2d0c0521ec7497d63d2da2686b227a9e6714492f1f6dc5ea2b280d08bf27608f491dd

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      SecuriteInfo.com.Win32.Sector.30.16924.15564

    • Size

      1.1MB

    • MD5

      9940b1d4284582df2342b9c394b34d20

    • SHA1

      ffe310f517cc7e6e7dc6ca10007338b2c1d09f66

    • SHA256

      087df168d78dcfd730fb669aad4b848c054f08cbab3c722c87a0be0aa5c598a7

    • SHA512

      b578d6c3a27f56d85ddeadcc8f96a40c3aa4c64684d9d0451769233997c2d0c0521ec7497d63d2da2686b227a9e6714492f1f6dc5ea2b280d08bf27608f491dd

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks