General

  • Target

    NEAS.b95828865b65d04f899da76da4e94230.exe

  • Size

    120KB

  • Sample

    231105-z9lj2ach5v

  • MD5

    b95828865b65d04f899da76da4e94230

  • SHA1

    2c4fb99617f716e0bd85a3b27dc1568b3ddea3bb

  • SHA256

    ed8da93e4ac3a6302145aa49f185cd269719a36846de2e515291b2d1ad29fe62

  • SHA512

    73d9455b01340a9cd3d5540d08ff68ab077cd979c84886fd98fef092150cde9d7c9a2801d67057f8d20ab7b0851c08543b59a7e41971dbf1b9d0224a60f52613

  • SSDEEP

    3072:9OnNYGs5NqausC8+/9Gq+xyvUDQneIB2O+o:on08axSH+MvmQnewKo

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      NEAS.b95828865b65d04f899da76da4e94230.exe

    • Size

      120KB

    • MD5

      b95828865b65d04f899da76da4e94230

    • SHA1

      2c4fb99617f716e0bd85a3b27dc1568b3ddea3bb

    • SHA256

      ed8da93e4ac3a6302145aa49f185cd269719a36846de2e515291b2d1ad29fe62

    • SHA512

      73d9455b01340a9cd3d5540d08ff68ab077cd979c84886fd98fef092150cde9d7c9a2801d67057f8d20ab7b0851c08543b59a7e41971dbf1b9d0224a60f52613

    • SSDEEP

      3072:9OnNYGs5NqausC8+/9Gq+xyvUDQneIB2O+o:on08axSH+MvmQnewKo

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks