General

  • Target

    NEAS.f155ea81b65e19eb555d76b6862bbe30.exe

  • Size

    65KB

  • Sample

    231014-j9rs2scc46

  • MD5

    f155ea81b65e19eb555d76b6862bbe30

  • SHA1

    a4bb56d07d74f4bf0c8d689d91d16255fe7dc9dd

  • SHA256

    f447f72b8ae11b1fb499986e243ddcb3ecf50d2561c8f935f4d2f546f2b8d98b

  • SHA512

    044170e5d392e78bd0d460db92f26039d7603edba164ad3d9a99bc1e439812288418c41464c9479b2e6ff9fb78b72cfc5f8356a6447b993d73859ca86dd46e72

  • SSDEEP

    1536:aXhY17hndN53IXAnHyQJDZvjk9mArS2enJ7a2MM140bCBnmYz6PSe:Ih6ld7nBJNvY9ZS2YJuVvcCVmLPSe

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      NEAS.f155ea81b65e19eb555d76b6862bbe30.exe

    • Size

      65KB

    • MD5

      f155ea81b65e19eb555d76b6862bbe30

    • SHA1

      a4bb56d07d74f4bf0c8d689d91d16255fe7dc9dd

    • SHA256

      f447f72b8ae11b1fb499986e243ddcb3ecf50d2561c8f935f4d2f546f2b8d98b

    • SHA512

      044170e5d392e78bd0d460db92f26039d7603edba164ad3d9a99bc1e439812288418c41464c9479b2e6ff9fb78b72cfc5f8356a6447b993d73859ca86dd46e72

    • SSDEEP

      1536:aXhY17hndN53IXAnHyQJDZvjk9mArS2enJ7a2MM140bCBnmYz6PSe:Ih6ld7nBJNvY9ZS2YJuVvcCVmLPSe

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks