General

  • Target

    e7ab8fe0ef8944afc66140f863a83f3f32fbc25f5fb5919ca0d4d7b0fb1de1fc

  • Size

    65KB

  • Sample

    240724-ewnr1s1bqh

  • MD5

    0519eccbb69056f48e8c489cc0442828

  • SHA1

    e57c268466de0e30578f8ece12319c6f236e10f2

  • SHA256

    e7ab8fe0ef8944afc66140f863a83f3f32fbc25f5fb5919ca0d4d7b0fb1de1fc

  • SHA512

    d07aa4b401866a6a36619d4415483f26b2e11fd158aa8ea60cd38856c750ef181e9f0d6bbfa2941d10622f62c02c32ee41bcff14c9ba8c59609ece9051d0697e

  • SSDEEP

    1536:75K8M0lwbU50yAeQC8+z6Smttmum19s+HkspLO76zEW9:U8UU50JepU+EmLO7U

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e7ab8fe0ef8944afc66140f863a83f3f32fbc25f5fb5919ca0d4d7b0fb1de1fc

    • Size

      65KB

    • MD5

      0519eccbb69056f48e8c489cc0442828

    • SHA1

      e57c268466de0e30578f8ece12319c6f236e10f2

    • SHA256

      e7ab8fe0ef8944afc66140f863a83f3f32fbc25f5fb5919ca0d4d7b0fb1de1fc

    • SHA512

      d07aa4b401866a6a36619d4415483f26b2e11fd158aa8ea60cd38856c750ef181e9f0d6bbfa2941d10622f62c02c32ee41bcff14c9ba8c59609ece9051d0697e

    • SSDEEP

      1536:75K8M0lwbU50yAeQC8+z6Smttmum19s+HkspLO76zEW9:U8UU50JepU+EmLO7U

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks