General

  • Target

    e26b90e3ca31542f44a126d861d331d36ac76ede36c5d16f70c6daa14b220077

  • Size

    100KB

  • Sample

    221020-nqcbgabgfl

  • MD5

    90413b86023d24d9f4a865f1f8900bfd

  • SHA1

    621349619c7f8010f94fe2a5345b7a8a7cc9517b

  • SHA256

    e26b90e3ca31542f44a126d861d331d36ac76ede36c5d16f70c6daa14b220077

  • SHA512

    f9d19b815ea78c7b91b2ceb46ddb4ff768e38fb07d841b668c88e705d3b9a163572dc0f037e953d90593863bac662e87bfce0375c4719ccc571843bb8fbaf325

  • SSDEEP

    1536:7ZBh7QgfE98Qy8IwOnKSPKy28wfhW+gTLuHmUYwcgwXZOd31Rsy:9bQli4bhMTLu/lwYLRB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      e26b90e3ca31542f44a126d861d331d36ac76ede36c5d16f70c6daa14b220077

    • Size

      100KB

    • MD5

      90413b86023d24d9f4a865f1f8900bfd

    • SHA1

      621349619c7f8010f94fe2a5345b7a8a7cc9517b

    • SHA256

      e26b90e3ca31542f44a126d861d331d36ac76ede36c5d16f70c6daa14b220077

    • SHA512

      f9d19b815ea78c7b91b2ceb46ddb4ff768e38fb07d841b668c88e705d3b9a163572dc0f037e953d90593863bac662e87bfce0375c4719ccc571843bb8fbaf325

    • SSDEEP

      1536:7ZBh7QgfE98Qy8IwOnKSPKy28wfhW+gTLuHmUYwcgwXZOd31Rsy:9bQli4bhMTLu/lwYLRB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks