General

  • Target

    365919985555ae13c73580fa065ebfde69fef9781ad5b03d9ca264d60c5b27bc

  • Size

    2.2MB

  • Sample

    220626-da2w3seben

  • MD5

    1e78499a090a18bc80fefbed2801c80c

  • SHA1

    4849a1d6b92cf106f1153e6bb219417215677117

  • SHA256

    365919985555ae13c73580fa065ebfde69fef9781ad5b03d9ca264d60c5b27bc

  • SHA512

    5bc1ce689cd9e1ac7c7ed073e8c8c934cddcc58d8fd5ddd07f374d7a0febff9c2a8c79149251af73cef03289699446e6736b93a7f9442639f3fb552918bccf0d

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      365919985555ae13c73580fa065ebfde69fef9781ad5b03d9ca264d60c5b27bc

    • Size

      2.2MB

    • MD5

      1e78499a090a18bc80fefbed2801c80c

    • SHA1

      4849a1d6b92cf106f1153e6bb219417215677117

    • SHA256

      365919985555ae13c73580fa065ebfde69fef9781ad5b03d9ca264d60c5b27bc

    • SHA512

      5bc1ce689cd9e1ac7c7ed073e8c8c934cddcc58d8fd5ddd07f374d7a0febff9c2a8c79149251af73cef03289699446e6736b93a7f9442639f3fb552918bccf0d

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks