General

  • Target

    2e4adfb7cd47a3428e91a1da99ebd372b57e17b1ef69f0c414bb91fbc15b4567

  • Size

    97KB

  • Sample

    221003-w5swrsagh7

  • MD5

    3f031457cc756a5e86348db02ab2747d

  • SHA1

    7810aa4e305c3d3998f71cfb079a510a304fcc68

  • SHA256

    2e4adfb7cd47a3428e91a1da99ebd372b57e17b1ef69f0c414bb91fbc15b4567

  • SHA512

    791bc24d8f69ec62b677c3ca237906c83955d41de88e5ef055b6aa382e7dd72b32974f65e1540fd56b4ebf66f479a8ecc8909485fa1e1eb3f5eb03e00eef8268

  • SSDEEP

    1536:v+/RbG6ESzhl9Qiyz+MAA3135ndLA7O6ZSkOoLSNojUHzalqpT8OwAwAiL5Wf0cb:wZGWNa+s5ndLAC6WoOeUHWopTqdVWP

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2e4adfb7cd47a3428e91a1da99ebd372b57e17b1ef69f0c414bb91fbc15b4567

    • Size

      97KB

    • MD5

      3f031457cc756a5e86348db02ab2747d

    • SHA1

      7810aa4e305c3d3998f71cfb079a510a304fcc68

    • SHA256

      2e4adfb7cd47a3428e91a1da99ebd372b57e17b1ef69f0c414bb91fbc15b4567

    • SHA512

      791bc24d8f69ec62b677c3ca237906c83955d41de88e5ef055b6aa382e7dd72b32974f65e1540fd56b4ebf66f479a8ecc8909485fa1e1eb3f5eb03e00eef8268

    • SSDEEP

      1536:v+/RbG6ESzhl9Qiyz+MAA3135ndLA7O6ZSkOoLSNojUHzalqpT8OwAwAiL5Wf0cb:wZGWNa+s5ndLAC6WoOeUHWopTqdVWP

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks