General

  • Target

    00e9c7aba40a3d19d9beea63e7d61ab0.bin

  • Size

    65KB

  • Sample

    240611-bc51eaxfqd

  • MD5

    00e9c7aba40a3d19d9beea63e7d61ab0

  • SHA1

    900b85010cba871e38731390e49fcb1ca31d889f

  • SHA256

    fa3dec9879ad3572a96e54f91156ce3700d9062e0980e764ddcb53301dc4c572

  • SHA512

    b9879698b23edcd2173ae68f011ee9d8797db7ae652c9a45aa0906708f438db6a1a112310dde0c2f2920312a86bcaaa84032c4316ddafee1836c7164ef814e26

  • SSDEEP

    1536:nermtiBuToiRPqlntyJjVqZCuI3pn6VkDYhljtS6/x/0LOZ+WrrJxyWD:EmMBuDRSlnEJ8fI96uDUl5ZCIf

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      00e9c7aba40a3d19d9beea63e7d61ab0.bin

    • Size

      65KB

    • MD5

      00e9c7aba40a3d19d9beea63e7d61ab0

    • SHA1

      900b85010cba871e38731390e49fcb1ca31d889f

    • SHA256

      fa3dec9879ad3572a96e54f91156ce3700d9062e0980e764ddcb53301dc4c572

    • SHA512

      b9879698b23edcd2173ae68f011ee9d8797db7ae652c9a45aa0906708f438db6a1a112310dde0c2f2920312a86bcaaa84032c4316ddafee1836c7164ef814e26

    • SSDEEP

      1536:nermtiBuToiRPqlntyJjVqZCuI3pn6VkDYhljtS6/x/0LOZ+WrrJxyWD:EmMBuDRSlnEJ8fI96uDUl5ZCIf

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks