General

  • Target

    470c5a6508b6ee4cd8d209a92f321e6e57e211b0c0ef8456802628ecfb664054

  • Size

    145KB

  • Sample

    221020-df56pabefj

  • MD5

    818a5c45d3a7cd474e0ee0df62d03076

  • SHA1

    6a9ded15f856522a912db9253762777eed66febe

  • SHA256

    470c5a6508b6ee4cd8d209a92f321e6e57e211b0c0ef8456802628ecfb664054

  • SHA512

    882d980cd64f9d66ce525a4935490829b8cc5681c7ac23fbffc9b21205a5bf75ebc7308318be27cecc14f3e1445ef23d32bbfcab45236645c419fb119a855e64

  • SSDEEP

    3072:XDTXPjS36nTYoN71lQaAhqvstX1WBWImeS6mF/iej43:m36nTFpQaTvsuxTeS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      470c5a6508b6ee4cd8d209a92f321e6e57e211b0c0ef8456802628ecfb664054

    • Size

      145KB

    • MD5

      818a5c45d3a7cd474e0ee0df62d03076

    • SHA1

      6a9ded15f856522a912db9253762777eed66febe

    • SHA256

      470c5a6508b6ee4cd8d209a92f321e6e57e211b0c0ef8456802628ecfb664054

    • SHA512

      882d980cd64f9d66ce525a4935490829b8cc5681c7ac23fbffc9b21205a5bf75ebc7308318be27cecc14f3e1445ef23d32bbfcab45236645c419fb119a855e64

    • SSDEEP

      3072:XDTXPjS36nTYoN71lQaAhqvstX1WBWImeS6mF/iej43:m36nTFpQaTvsuxTeS

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks