General

  • Target

    5eab4bbb8de72134358532026f4b835ff292d726d0901f52fcc35731f61b3c98

  • Size

    3.2MB

  • Sample

    240417-ywmphada52

  • MD5

    70cd8573ba2da33c7ff1ab3905737298

  • SHA1

    f2749c28bb0a9f0b96c51e2dc4b40558a56ec42d

  • SHA256

    5eab4bbb8de72134358532026f4b835ff292d726d0901f52fcc35731f61b3c98

  • SHA512

    672ace5761dba55c9d2b9511412e69098a58d57f4e4ac7f864e31eeed71f7bb71505cc06d46828f3a56666fbce988f7a5b34641c1e13080f81795e0e1b4aa097

  • SSDEEP

    49152:1NdDGViZaH7/p+Slo8+56LaShsyIWxmSUPlo0DRZh/ZTCd333WjWf:fBGViCwdux3UPlo0VZpA333H

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      5eab4bbb8de72134358532026f4b835ff292d726d0901f52fcc35731f61b3c98

    • Size

      3.2MB

    • MD5

      70cd8573ba2da33c7ff1ab3905737298

    • SHA1

      f2749c28bb0a9f0b96c51e2dc4b40558a56ec42d

    • SHA256

      5eab4bbb8de72134358532026f4b835ff292d726d0901f52fcc35731f61b3c98

    • SHA512

      672ace5761dba55c9d2b9511412e69098a58d57f4e4ac7f864e31eeed71f7bb71505cc06d46828f3a56666fbce988f7a5b34641c1e13080f81795e0e1b4aa097

    • SSDEEP

      49152:1NdDGViZaH7/p+Slo8+56LaShsyIWxmSUPlo0DRZh/ZTCd333WjWf:fBGViCwdux3UPlo0VZpA333H

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks