General

  • Target

    20e2e50cde410b0b21f78a3ae08cbe4460900924294d88b72c487c42d11e66d9

  • Size

    116KB

  • Sample

    241122-m9nceazjev

  • MD5

    521cbe25dfee2700b78e9e806eb7d7f1

  • SHA1

    0542806453c9d08800aa4ad62191259d6f1517c1

  • SHA256

    20e2e50cde410b0b21f78a3ae08cbe4460900924294d88b72c487c42d11e66d9

  • SHA512

    74df7e3cf1772b72209c82d98e7b056616f165e835ed96d3e5e156ad0e943e17a8092172075c5ae3b7ba9b0384862b9323b582ca0bc71f931403aa9b16f049a9

  • SSDEEP

    3072:JYK60a3KAlQq8wcRBongM7JRgSnGi+qbu4iZV:J/60At8wcXog4JRg5T4E

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      20e2e50cde410b0b21f78a3ae08cbe4460900924294d88b72c487c42d11e66d9

    • Size

      116KB

    • MD5

      521cbe25dfee2700b78e9e806eb7d7f1

    • SHA1

      0542806453c9d08800aa4ad62191259d6f1517c1

    • SHA256

      20e2e50cde410b0b21f78a3ae08cbe4460900924294d88b72c487c42d11e66d9

    • SHA512

      74df7e3cf1772b72209c82d98e7b056616f165e835ed96d3e5e156ad0e943e17a8092172075c5ae3b7ba9b0384862b9323b582ca0bc71f931403aa9b16f049a9

    • SSDEEP

      3072:JYK60a3KAlQq8wcRBongM7JRgSnGi+qbu4iZV:J/60At8wcXog4JRg5T4E

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks