General

  • Target

    03dd1391b74d350f4e078c631356bee0N.exe

  • Size

    65KB

  • Sample

    240727-1d9gnazdqj

  • MD5

    03dd1391b74d350f4e078c631356bee0

  • SHA1

    dc20be486d32745fa1a8a255e6a0e4555c6db920

  • SHA256

    d0773a6ed6b3d7a23c56148c4b930b0d2822cc96e87b64155afdd67907f2c5ac

  • SHA512

    0929d4ef0d712d3459185013362d3fe44e7e110bfa0111efd3aef3e4e0f687ce2f111d0b2e893ff3e22d979b45f7f1646f98687e951c237cb5dc5b6b15401584

  • SSDEEP

    1536:FrQGhHvamcBfa4qS3tuL0dYYEehyFXkI6B2ce1R:FEsvAa4BgodLEehwXB6Qr

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      03dd1391b74d350f4e078c631356bee0N.exe

    • Size

      65KB

    • MD5

      03dd1391b74d350f4e078c631356bee0

    • SHA1

      dc20be486d32745fa1a8a255e6a0e4555c6db920

    • SHA256

      d0773a6ed6b3d7a23c56148c4b930b0d2822cc96e87b64155afdd67907f2c5ac

    • SHA512

      0929d4ef0d712d3459185013362d3fe44e7e110bfa0111efd3aef3e4e0f687ce2f111d0b2e893ff3e22d979b45f7f1646f98687e951c237cb5dc5b6b15401584

    • SSDEEP

      1536:FrQGhHvamcBfa4qS3tuL0dYYEehyFXkI6B2ce1R:FEsvAa4BgodLEehwXB6Qr

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks