General

  • Target

    NEAS.4d4916a25ff8009504ba6dd45221e1b0_JC.exe

  • Size

    120KB

  • Sample

    231105-bbag4sah79

  • MD5

    4d4916a25ff8009504ba6dd45221e1b0

  • SHA1

    478b61fe4305d55393b2ba5c81a451aa04cc8fad

  • SHA256

    1ee99e2349d50db3fadaad51fc635114257025d6abbe41f8194321a395560c04

  • SHA512

    0b72e406f79787e95806f9d696f4908ddeaa3e73a7d1620492b8778de5bdd735d58a3e92ad16cc56a3a617a54e790c363cd5f20101a985bd4d99cb55fac53700

  • SSDEEP

    1536:XMDo5SVuvNHVcqlT3i1qG3Ivs2r47Xzio/pxLhfdYzCfsmzU31VoGsM:X3U+IzIE20nf6zNmg3zrs

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      NEAS.4d4916a25ff8009504ba6dd45221e1b0_JC.exe

    • Size

      120KB

    • MD5

      4d4916a25ff8009504ba6dd45221e1b0

    • SHA1

      478b61fe4305d55393b2ba5c81a451aa04cc8fad

    • SHA256

      1ee99e2349d50db3fadaad51fc635114257025d6abbe41f8194321a395560c04

    • SHA512

      0b72e406f79787e95806f9d696f4908ddeaa3e73a7d1620492b8778de5bdd735d58a3e92ad16cc56a3a617a54e790c363cd5f20101a985bd4d99cb55fac53700

    • SSDEEP

      1536:XMDo5SVuvNHVcqlT3i1qG3Ivs2r47Xzio/pxLhfdYzCfsmzU31VoGsM:X3U+IzIE20nf6zNmg3zrs

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks