General

  • Target

    eb5b471fe10c81ea6f644dc3230ddf3fe094c82d3858c8d9806cb45de78f10d2N

  • Size

    97KB

  • Sample

    241008-3xpygazgmm

  • MD5

    ece496c403318e9f02cdb676a295aa20

  • SHA1

    c3fce76067409c458cd5f6ab5766440067f5c725

  • SHA256

    eb5b471fe10c81ea6f644dc3230ddf3fe094c82d3858c8d9806cb45de78f10d2

  • SHA512

    4ff685b64dc5ce53da9041851cfa69479c1922b7d15f2bca1afcecd6ff001434a647ec850fc68887fdc76573c6ee52300f6adf09b7902ad58bda9650bf122222

  • SSDEEP

    3072:lCNaXroxGMcU4lAKCX0GLf/L3oaLnopgDiInfjiuf:DXdMcllAKCXVL3oarigDiYm

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      eb5b471fe10c81ea6f644dc3230ddf3fe094c82d3858c8d9806cb45de78f10d2N

    • Size

      97KB

    • MD5

      ece496c403318e9f02cdb676a295aa20

    • SHA1

      c3fce76067409c458cd5f6ab5766440067f5c725

    • SHA256

      eb5b471fe10c81ea6f644dc3230ddf3fe094c82d3858c8d9806cb45de78f10d2

    • SHA512

      4ff685b64dc5ce53da9041851cfa69479c1922b7d15f2bca1afcecd6ff001434a647ec850fc68887fdc76573c6ee52300f6adf09b7902ad58bda9650bf122222

    • SSDEEP

      3072:lCNaXroxGMcU4lAKCX0GLf/L3oaLnopgDiInfjiuf:DXdMcllAKCXVL3oarigDiYm

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks