General

  • Target

    be74e87aba728a0ba365941b9ee0dbf22e82f4ccc66e0f1595e20e7d2e1a196a

  • Size

    65KB

  • Sample

    240707-dfnxeasbmk

  • MD5

    9f2bc65c69393d00ea1c76f8c4269084

  • SHA1

    53a37e6811fbda20e4764b99dae11ab90028aaca

  • SHA256

    be74e87aba728a0ba365941b9ee0dbf22e82f4ccc66e0f1595e20e7d2e1a196a

  • SHA512

    54115b342a3d40623362f20bfc5c1f9e764b638ae107e188f59a7ec5b3f62be5ff84db1b2c58acffaed7ca725aea92bc012f35fe95ec0b611abc4b5470166f17

  • SSDEEP

    1536:t85TERLA1cORkh4JtXW6oTPVprG0i2o6mUCFm3H51Cc5:twSLAXRjJtXW6+Vp6YmUC4Cc5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      be74e87aba728a0ba365941b9ee0dbf22e82f4ccc66e0f1595e20e7d2e1a196a

    • Size

      65KB

    • MD5

      9f2bc65c69393d00ea1c76f8c4269084

    • SHA1

      53a37e6811fbda20e4764b99dae11ab90028aaca

    • SHA256

      be74e87aba728a0ba365941b9ee0dbf22e82f4ccc66e0f1595e20e7d2e1a196a

    • SHA512

      54115b342a3d40623362f20bfc5c1f9e764b638ae107e188f59a7ec5b3f62be5ff84db1b2c58acffaed7ca725aea92bc012f35fe95ec0b611abc4b5470166f17

    • SSDEEP

      1536:t85TERLA1cORkh4JtXW6oTPVprG0i2o6mUCFm3H51Cc5:twSLAXRjJtXW6+Vp6YmUC4Cc5

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks