General

  • Target

    NEAS.92adddbd2e93097b8b3794a979a3cc40.exe

  • Size

    648KB

  • Sample

    231022-vyl9zafb9y

  • MD5

    92adddbd2e93097b8b3794a979a3cc40

  • SHA1

    efe62bb9cc14831b1b00b1b2e14d3ebd982edc71

  • SHA256

    458f64a52861752a369d724e3083f7154b96a7918860a7dad1cb9475929ade18

  • SHA512

    828039f95c1eaf655204119db8e1ef12ebc9358f15d9ba0555aa65af894ae9a56b669cb3ba61ec9f63aee1014a12d4973488143773475356a161aacea59fd0ca

  • SSDEEP

    12288:Qikxc69yX030T4r0FMx2PWn4u02K/wkUzOvY:Qm00u0FMx2+42KrSX

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      NEAS.92adddbd2e93097b8b3794a979a3cc40.exe

    • Size

      648KB

    • MD5

      92adddbd2e93097b8b3794a979a3cc40

    • SHA1

      efe62bb9cc14831b1b00b1b2e14d3ebd982edc71

    • SHA256

      458f64a52861752a369d724e3083f7154b96a7918860a7dad1cb9475929ade18

    • SHA512

      828039f95c1eaf655204119db8e1ef12ebc9358f15d9ba0555aa65af894ae9a56b669cb3ba61ec9f63aee1014a12d4973488143773475356a161aacea59fd0ca

    • SSDEEP

      12288:Qikxc69yX030T4r0FMx2PWn4u02K/wkUzOvY:Qm00u0FMx2+42KrSX

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks