General

  • Target

    NEAS.3ea5c35ac342f225b2f72a2dfc1f4770.exe

  • Size

    120KB

  • Sample

    231014-wfq1wabd49

  • MD5

    3ea5c35ac342f225b2f72a2dfc1f4770

  • SHA1

    0e9109b5603413718d7ff0700afdc2b593d567fc

  • SHA256

    3a348031ae0f72000204f3968f24fcc4ef5219e29f6fac4f69900e39a655fe90

  • SHA512

    99fd93ab8863d187ab0fa6c07660337427ba2ede4439a318d0d21e28953a5e50c6117e978b2bf16d572bd9d3b6c4f14d6e9c0d0089890495b327480fed388a41

  • SSDEEP

    3072:LpQlUMXeB0ZwoCen6Wmgz3RWbpPReQ24:qlVeyeo3lrMNd

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      NEAS.3ea5c35ac342f225b2f72a2dfc1f4770.exe

    • Size

      120KB

    • MD5

      3ea5c35ac342f225b2f72a2dfc1f4770

    • SHA1

      0e9109b5603413718d7ff0700afdc2b593d567fc

    • SHA256

      3a348031ae0f72000204f3968f24fcc4ef5219e29f6fac4f69900e39a655fe90

    • SHA512

      99fd93ab8863d187ab0fa6c07660337427ba2ede4439a318d0d21e28953a5e50c6117e978b2bf16d572bd9d3b6c4f14d6e9c0d0089890495b327480fed388a41

    • SSDEEP

      3072:LpQlUMXeB0ZwoCen6Wmgz3RWbpPReQ24:qlVeyeo3lrMNd

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks