General

  • Target

    NEAS.4a923dddfd11cd8fb13976bf59689860.exe

  • Size

    120KB

  • Sample

    231021-z6ay5aef32

  • MD5

    4a923dddfd11cd8fb13976bf59689860

  • SHA1

    c8f3f44b427038af1e25f762bff581d2b0185852

  • SHA256

    5cbc78d517dea4c29b3d486e39806e8c96f13c0960f03ba12b9d11f039ac8c85

  • SHA512

    749d07d6bb3a392e9bafcbc9969cd400c53aa08bc6745862cff32d7d3d9fc879a0e3a53237dcdf96dd8305f4a6a6e064fa73e1d1811958138b8010f1e17a6500

  • SSDEEP

    3072:jK7YuNSrkEt4O6C6+IfXMWpLk3oEqvbdFFkbT:u7YuN57C6+mK35oFk

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      NEAS.4a923dddfd11cd8fb13976bf59689860.exe

    • Size

      120KB

    • MD5

      4a923dddfd11cd8fb13976bf59689860

    • SHA1

      c8f3f44b427038af1e25f762bff581d2b0185852

    • SHA256

      5cbc78d517dea4c29b3d486e39806e8c96f13c0960f03ba12b9d11f039ac8c85

    • SHA512

      749d07d6bb3a392e9bafcbc9969cd400c53aa08bc6745862cff32d7d3d9fc879a0e3a53237dcdf96dd8305f4a6a6e064fa73e1d1811958138b8010f1e17a6500

    • SSDEEP

      3072:jK7YuNSrkEt4O6C6+IfXMWpLk3oEqvbdFFkbT:u7YuN57C6+mK35oFk

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks