General

  • Target

    ae4dbc36e90010a1d49fcc42e650a6a36a2dcfff5aa84f32dee131654807c57d

  • Size

    100KB

  • Sample

    221030-1n6hracbb8

  • MD5

    9245788017a910f6bd0bd3f572909e77

  • SHA1

    e5c0f9091e4e63f7902227a1fd09b136ff601a4a

  • SHA256

    ae4dbc36e90010a1d49fcc42e650a6a36a2dcfff5aa84f32dee131654807c57d

  • SHA512

    61283f7cb2739140792da2c00ebb6dbe4eb18952cc1649723afb3e5d21bd728c1b01e4c8550dd20f2c958d94e1a8b234997146413a8c3952fc6703c41ce480df

  • SSDEEP

    1536:8YuTGWA8WZ/fnAFLRi9syTx+dLoSHYKxYOUn33vvOlr5d5j5:8Fmf6i9syV+dLoS4K6PPg5H

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      ae4dbc36e90010a1d49fcc42e650a6a36a2dcfff5aa84f32dee131654807c57d

    • Size

      100KB

    • MD5

      9245788017a910f6bd0bd3f572909e77

    • SHA1

      e5c0f9091e4e63f7902227a1fd09b136ff601a4a

    • SHA256

      ae4dbc36e90010a1d49fcc42e650a6a36a2dcfff5aa84f32dee131654807c57d

    • SHA512

      61283f7cb2739140792da2c00ebb6dbe4eb18952cc1649723afb3e5d21bd728c1b01e4c8550dd20f2c958d94e1a8b234997146413a8c3952fc6703c41ce480df

    • SSDEEP

      1536:8YuTGWA8WZ/fnAFLRi9syTx+dLoSHYKxYOUn33vvOlr5d5j5:8Fmf6i9syV+dLoS4K6PPg5H

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks