General

  • Target

    cda7dcba92b6479ecae68e92de6f900c38c61f4cda28e18c8210903a9eff50b1

  • Size

    2.1MB

  • Sample

    240517-rn6n3sbd7x

  • MD5

    7132789b3afd31bbd8a9ca9fd05b190c

  • SHA1

    b536d55d4a1eef0f144b788eec426dc3aa3f942a

  • SHA256

    cda7dcba92b6479ecae68e92de6f900c38c61f4cda28e18c8210903a9eff50b1

  • SHA512

    ae90cc1647ac0d064c6bea9f48d6cf2bee46df9c389ac39ca098bab6af0439648bfb807cd4576dea6f6bad007e1d824a4a0082676ec1168f98d55cd60ede92fc

  • SSDEEP

    24576:tpzKTGA8fRfabohqemWaxxVWnU7CCGEqIGEdu11/gJH+6z4YfuHIpl:TKizfQO9axf6FCGE4TgJVz4K

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      cda7dcba92b6479ecae68e92de6f900c38c61f4cda28e18c8210903a9eff50b1

    • Size

      2.1MB

    • MD5

      7132789b3afd31bbd8a9ca9fd05b190c

    • SHA1

      b536d55d4a1eef0f144b788eec426dc3aa3f942a

    • SHA256

      cda7dcba92b6479ecae68e92de6f900c38c61f4cda28e18c8210903a9eff50b1

    • SHA512

      ae90cc1647ac0d064c6bea9f48d6cf2bee46df9c389ac39ca098bab6af0439648bfb807cd4576dea6f6bad007e1d824a4a0082676ec1168f98d55cd60ede92fc

    • SSDEEP

      24576:tpzKTGA8fRfabohqemWaxxVWnU7CCGEqIGEdu11/gJH+6z4YfuHIpl:TKizfQO9axf6FCGE4TgJVz4K

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks