General

  • Target

    a5c5bb762d5bd77b68dc8fcb571dde2cc413f7c756d682e1da295dd47d88ab6b

  • Size

    100KB

  • Sample

    221203-nzcnlagc72

  • MD5

    f85dbd139b22a489996287c4cf819a14

  • SHA1

    243cd7e0d5126a8ec5611f5cf7c2216eecfe8ab9

  • SHA256

    a5c5bb762d5bd77b68dc8fcb571dde2cc413f7c756d682e1da295dd47d88ab6b

  • SHA512

    5e678be8bdc829d2f22ef47fc68761a70ba5fef7338581c62b820ce765d91b4b9a7a0a3364c0664bcd5114d77976a8d2469249742bfaf0937146492419302a2d

  • SSDEEP

    3072:dGh29HExqA6F+nRV4Yx4fEuaOMrNMiJMabvVROx1zjj:Ehr0+nn1x48tNPaCqbzf

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      a5c5bb762d5bd77b68dc8fcb571dde2cc413f7c756d682e1da295dd47d88ab6b

    • Size

      100KB

    • MD5

      f85dbd139b22a489996287c4cf819a14

    • SHA1

      243cd7e0d5126a8ec5611f5cf7c2216eecfe8ab9

    • SHA256

      a5c5bb762d5bd77b68dc8fcb571dde2cc413f7c756d682e1da295dd47d88ab6b

    • SHA512

      5e678be8bdc829d2f22ef47fc68761a70ba5fef7338581c62b820ce765d91b4b9a7a0a3364c0664bcd5114d77976a8d2469249742bfaf0937146492419302a2d

    • SSDEEP

      3072:dGh29HExqA6F+nRV4Yx4fEuaOMrNMiJMabvVROx1zjj:Ehr0+nn1x48tNPaCqbzf

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks