General

  • Target

    d45e5839f0554c7a75802adbb6c95c227823123a7d5fd26efbc21ef130a827b4

  • Size

    390KB

  • Sample

    220919-v9pjgaefal

  • MD5

    a604a8dd0d7f7707a1c98fdb6633d656

  • SHA1

    53d7ae87240aa244e4448e279022df77fba5d572

  • SHA256

    d45e5839f0554c7a75802adbb6c95c227823123a7d5fd26efbc21ef130a827b4

  • SHA512

    05dbc5e80230bdba42d39be332ce22dbf782e0bcdf5c69231b7cf7235c27d44f03e5dcf33207a14f0c42ad9327828b2a76606c6690e2ef1811de60cb2a0cbc9b

  • SSDEEP

    12288:QKrEpuX4lT1nexCWVLqXeEAl5hkDVNYYXkyLHNBGV:QKwpbneYWVqujTiNJXkyzNBGV

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d45e5839f0554c7a75802adbb6c95c227823123a7d5fd26efbc21ef130a827b4

    • Size

      390KB

    • MD5

      a604a8dd0d7f7707a1c98fdb6633d656

    • SHA1

      53d7ae87240aa244e4448e279022df77fba5d572

    • SHA256

      d45e5839f0554c7a75802adbb6c95c227823123a7d5fd26efbc21ef130a827b4

    • SHA512

      05dbc5e80230bdba42d39be332ce22dbf782e0bcdf5c69231b7cf7235c27d44f03e5dcf33207a14f0c42ad9327828b2a76606c6690e2ef1811de60cb2a0cbc9b

    • SSDEEP

      12288:QKrEpuX4lT1nexCWVLqXeEAl5hkDVNYYXkyLHNBGV:QKwpbneYWVqujTiNJXkyzNBGV

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks