General

  • Target

    NEAS.c9ee0ae6e2b62ba484614174c59e6be0.exe

  • Size

    65KB

  • Sample

    231115-hhwr9adg53

  • MD5

    c9ee0ae6e2b62ba484614174c59e6be0

  • SHA1

    389446663d5deac499fcff644c05fc6e694ac4b1

  • SHA256

    839eb2bcea61ebc60b69ade11fe55d38b23c5ec6033851e63fcef368a9fa5a95

  • SHA512

    7ef64c23dc1b1f518c435f9c76c5c8cacedec4ffc72e6099ff3784030778b2ce2911639b3036ad5d862b91493d2975f0b5726d622850f956cb7d8853ade65711

  • SSDEEP

    1536:QFi1F7P8yIZiXqNDci+npiN5/hFlBwpF2yJNXv6FV:QFwzCiX8Dcw/hFl8FZ6FV

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      NEAS.c9ee0ae6e2b62ba484614174c59e6be0.exe

    • Size

      65KB

    • MD5

      c9ee0ae6e2b62ba484614174c59e6be0

    • SHA1

      389446663d5deac499fcff644c05fc6e694ac4b1

    • SHA256

      839eb2bcea61ebc60b69ade11fe55d38b23c5ec6033851e63fcef368a9fa5a95

    • SHA512

      7ef64c23dc1b1f518c435f9c76c5c8cacedec4ffc72e6099ff3784030778b2ce2911639b3036ad5d862b91493d2975f0b5726d622850f956cb7d8853ade65711

    • SSDEEP

      1536:QFi1F7P8yIZiXqNDci+npiN5/hFlBwpF2yJNXv6FV:QFwzCiX8Dcw/hFl8FZ6FV

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks