General

  • Target

    NEAS.fc34a99ffc6fe87f821aca721957a900.exe

  • Size

    120KB

  • Sample

    231102-vd4zaacc8w

  • MD5

    fc34a99ffc6fe87f821aca721957a900

  • SHA1

    4381dec01f71e137b74a069fb1eb78c51ec748ae

  • SHA256

    3423c91b299f12561a21a3a4366454f0b7b152c8d6a22001ea34b606719fe736

  • SHA512

    abc97dfe9e0116c1ce1f38bf76f6e2fe0b306e1ebc5e627e79a577265591082675e1a3c47d7f25c33d47b8971e6baa70356746fbe0f6f16e30c62da3e8b016df

  • SSDEEP

    3072:l1+G3m8VaaQuTFmC0ZsfWqhEZMmP20U3uTkiUFkLejNmOPQ:l1x39hTUxs1hEZMm1U3uAiUFkLej

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      NEAS.fc34a99ffc6fe87f821aca721957a900.exe

    • Size

      120KB

    • MD5

      fc34a99ffc6fe87f821aca721957a900

    • SHA1

      4381dec01f71e137b74a069fb1eb78c51ec748ae

    • SHA256

      3423c91b299f12561a21a3a4366454f0b7b152c8d6a22001ea34b606719fe736

    • SHA512

      abc97dfe9e0116c1ce1f38bf76f6e2fe0b306e1ebc5e627e79a577265591082675e1a3c47d7f25c33d47b8971e6baa70356746fbe0f6f16e30c62da3e8b016df

    • SSDEEP

      3072:l1+G3m8VaaQuTFmC0ZsfWqhEZMmP20U3uTkiUFkLejNmOPQ:l1x39hTUxs1hEZMm1U3uAiUFkLej

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks