General

  • Target

    d31fc3513750c9fc50c8390eb23a54ef7acb1e596c9abadf57cd106feea13c3fN

  • Size

    468KB

  • Sample

    240919-eayebszbqp

  • MD5

    762b55aa2db3afa7fad9d96a319a5ac0

  • SHA1

    a8a5232e30d99dffc9c2abd79bbe765a79783ca6

  • SHA256

    d31fc3513750c9fc50c8390eb23a54ef7acb1e596c9abadf57cd106feea13c3f

  • SHA512

    8e0542e6d1ca441702596f28ac247e355baa48ed313afb198b6787be5c05b333eec2b7d189bc52d69067c2152c553b6bf94a86115e81e2cb51d7564c9b89a876

  • SSDEEP

    12288:diU+9hDBDdkWEyVEIonYrkk3fiGxQwIFkL6Px:MU+/tDayVEIonUkkihC+x

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      d31fc3513750c9fc50c8390eb23a54ef7acb1e596c9abadf57cd106feea13c3fN

    • Size

      468KB

    • MD5

      762b55aa2db3afa7fad9d96a319a5ac0

    • SHA1

      a8a5232e30d99dffc9c2abd79bbe765a79783ca6

    • SHA256

      d31fc3513750c9fc50c8390eb23a54ef7acb1e596c9abadf57cd106feea13c3f

    • SHA512

      8e0542e6d1ca441702596f28ac247e355baa48ed313afb198b6787be5c05b333eec2b7d189bc52d69067c2152c553b6bf94a86115e81e2cb51d7564c9b89a876

    • SSDEEP

      12288:diU+9hDBDdkWEyVEIonYrkk3fiGxQwIFkL6Px:MU+/tDayVEIonUkkihC+x

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks