General

  • Target

    NEAS.8fff7224b9f6797279e62dfbfb870930.exe

  • Size

    120KB

  • Sample

    231118-gffgtach5v

  • MD5

    8fff7224b9f6797279e62dfbfb870930

  • SHA1

    de5caa8f4b212becf6e382814486d67fe49a0b94

  • SHA256

    94ea29d351ddfecddcd8a0305410a907bf040c698da284e99ed5d086b9101c10

  • SHA512

    2583550ad57f9a2fc888585d97ea9a4e4fbdd1873a46b4929aba27b65cf93c07b9f05e7c0ef79606dea12da9d2ccf87f22ddd1b90fb8431094eb484254b8cabf

  • SSDEEP

    3072:z/MdUoyNpQtWTbTLEGpWcctXQ9i2ofKB3:zMRyTQtWT/LEGkfKB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      NEAS.8fff7224b9f6797279e62dfbfb870930.exe

    • Size

      120KB

    • MD5

      8fff7224b9f6797279e62dfbfb870930

    • SHA1

      de5caa8f4b212becf6e382814486d67fe49a0b94

    • SHA256

      94ea29d351ddfecddcd8a0305410a907bf040c698da284e99ed5d086b9101c10

    • SHA512

      2583550ad57f9a2fc888585d97ea9a4e4fbdd1873a46b4929aba27b65cf93c07b9f05e7c0ef79606dea12da9d2ccf87f22ddd1b90fb8431094eb484254b8cabf

    • SSDEEP

      3072:z/MdUoyNpQtWTbTLEGpWcctXQ9i2ofKB3:zMRyTQtWT/LEGkfKB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks