General

  • Target

    2b397137635112a6a07b8eb4d7298222ceadfb4b75682fb5b11f72e89db5ea00N

  • Size

    460KB

  • Sample

    241009-pgbt1sydrg

  • MD5

    1b28dbf2650866745fd164122d0895f0

  • SHA1

    65b92f0416d9cea82c4eea7c27bb4e1337a7f2ab

  • SHA256

    2b397137635112a6a07b8eb4d7298222ceadfb4b75682fb5b11f72e89db5ea00

  • SHA512

    e9bcd356ffc066cfc38e953a48e8e4285a0404e256ad2608b2242e4b94655cc3c785acbe875f34abf01694efa5f1f0e734cf29297fe21468c9a70dbf22fce18d

  • SSDEEP

    12288:99pS2sNXlu5Ei0LFAxELTRKGoSif6J9Y2QsXJ8Z:99p2k5DEWELU/GC/+S

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2b397137635112a6a07b8eb4d7298222ceadfb4b75682fb5b11f72e89db5ea00N

    • Size

      460KB

    • MD5

      1b28dbf2650866745fd164122d0895f0

    • SHA1

      65b92f0416d9cea82c4eea7c27bb4e1337a7f2ab

    • SHA256

      2b397137635112a6a07b8eb4d7298222ceadfb4b75682fb5b11f72e89db5ea00

    • SHA512

      e9bcd356ffc066cfc38e953a48e8e4285a0404e256ad2608b2242e4b94655cc3c785acbe875f34abf01694efa5f1f0e734cf29297fe21468c9a70dbf22fce18d

    • SSDEEP

      12288:99pS2sNXlu5Ei0LFAxELTRKGoSif6J9Y2QsXJ8Z:99p2k5DEWELU/GC/+S

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks