General

  • Target

    cf8917306bbd4186106352ebb636d4494d238d62153f21f27e2130f1d5b11751

  • Size

    100KB

  • Sample

    221129-hvpvgafe96

  • MD5

    9c76bf36f6facc9de22f0e73b13925ab

  • SHA1

    f005f8087f4ff4e2685907c91e3e0bc74f239314

  • SHA256

    cf8917306bbd4186106352ebb636d4494d238d62153f21f27e2130f1d5b11751

  • SHA512

    55a110a9ba3c9c3d087960bb1a76eb26b197a90d88f647347310d82224ae0fe38f4b92669f50ac2a5d52703b6d8701490c4244efa1073b9b57ee84cd1164f1dc

  • SSDEEP

    3072:9TJxGU/FU+bbqxtof5NLlwzXuAIiUMC3e7mvy2El8:9zhtU+Aol2XuAM7+mZ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      cf8917306bbd4186106352ebb636d4494d238d62153f21f27e2130f1d5b11751

    • Size

      100KB

    • MD5

      9c76bf36f6facc9de22f0e73b13925ab

    • SHA1

      f005f8087f4ff4e2685907c91e3e0bc74f239314

    • SHA256

      cf8917306bbd4186106352ebb636d4494d238d62153f21f27e2130f1d5b11751

    • SHA512

      55a110a9ba3c9c3d087960bb1a76eb26b197a90d88f647347310d82224ae0fe38f4b92669f50ac2a5d52703b6d8701490c4244efa1073b9b57ee84cd1164f1dc

    • SSDEEP

      3072:9TJxGU/FU+bbqxtof5NLlwzXuAIiUMC3e7mvy2El8:9zhtU+Aol2XuAM7+mZ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks