General

  • Target

    72758fd14d0ae1522c5a8f6c21a4ec90fce5f9ec4d878653ffd0bb9a3fc23652

  • Size

    97KB

  • Sample

    240925-mv7sha1crk

  • MD5

    bfd3b19737e7ea2d56b7043faf9d6c8c

  • SHA1

    367c44414f1c5d1ad9857c7565cc16a15017fd18

  • SHA256

    72758fd14d0ae1522c5a8f6c21a4ec90fce5f9ec4d878653ffd0bb9a3fc23652

  • SHA512

    ace6c45c103d51d89513acc32d0b4cc54f074e8e81abaa1d987d889390a136baca4b62c47ac63e2e10f7cd42d5eb720598627c763cbe810ee5c5451015acb6ed

  • SSDEEP

    3072:TM1EQFSnS+2GDrY1Hu8/YpgA96BI9MIN9f/XFyK:T41knSZuSO8/Ypx5r/1y

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      72758fd14d0ae1522c5a8f6c21a4ec90fce5f9ec4d878653ffd0bb9a3fc23652

    • Size

      97KB

    • MD5

      bfd3b19737e7ea2d56b7043faf9d6c8c

    • SHA1

      367c44414f1c5d1ad9857c7565cc16a15017fd18

    • SHA256

      72758fd14d0ae1522c5a8f6c21a4ec90fce5f9ec4d878653ffd0bb9a3fc23652

    • SHA512

      ace6c45c103d51d89513acc32d0b4cc54f074e8e81abaa1d987d889390a136baca4b62c47ac63e2e10f7cd42d5eb720598627c763cbe810ee5c5451015acb6ed

    • SSDEEP

      3072:TM1EQFSnS+2GDrY1Hu8/YpgA96BI9MIN9f/XFyK:T41knSZuSO8/Ypx5r/1y

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks