General

  • Target

    a8a5f9f6c7374b76789ffdadd6e91e941fd764e72a41fd714c2b2e9d1bc42d63

  • Size

    1.3MB

  • Sample

    230827-f1dy2shf3v

  • MD5

    8cd445b6854e28c2b20ce5225846afe3

  • SHA1

    5fe8655f5a95e8955c433bafe01ea7da945d56ef

  • SHA256

    a8a5f9f6c7374b76789ffdadd6e91e941fd764e72a41fd714c2b2e9d1bc42d63

  • SHA512

    92982060d5a9445f800ada943c45b9e34dbcd14a003e688dc0c03be04e8423d0957e2ced26246c3255c7d79b47e678de1727a7511369ed6cb6822cfc08c5790b

  • SSDEEP

    24576:2N9iO2UR2f8hyUd8W0HscgL1wVaNqno10LC6aG7XdTaaGF3Osim1BxF0+UJ:2NOUG8KW0Mj1wTo1tu7XdTzGF3Fim1Bu

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a8a5f9f6c7374b76789ffdadd6e91e941fd764e72a41fd714c2b2e9d1bc42d63

    • Size

      1.3MB

    • MD5

      8cd445b6854e28c2b20ce5225846afe3

    • SHA1

      5fe8655f5a95e8955c433bafe01ea7da945d56ef

    • SHA256

      a8a5f9f6c7374b76789ffdadd6e91e941fd764e72a41fd714c2b2e9d1bc42d63

    • SHA512

      92982060d5a9445f800ada943c45b9e34dbcd14a003e688dc0c03be04e8423d0957e2ced26246c3255c7d79b47e678de1727a7511369ed6cb6822cfc08c5790b

    • SSDEEP

      24576:2N9iO2UR2f8hyUd8W0HscgL1wVaNqno10LC6aG7XdTaaGF3Osim1BxF0+UJ:2NOUG8KW0Mj1wTo1tu7XdTzGF3Fim1Bu

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks