General

  • Target

    66b0abe9734343c7845b55c205ce2a945192a89fda63b650b9f48e0c3f38c4d0

  • Size

    2.1MB

  • Sample

    241203-y2xrnaxnhj

  • MD5

    23dc9037e637780575a1b87fb3d49489

  • SHA1

    b1c9e8f8ebef84adca575f0b82c3664a905e1794

  • SHA256

    66b0abe9734343c7845b55c205ce2a945192a89fda63b650b9f48e0c3f38c4d0

  • SHA512

    bb516798b6d30d88e4f1d5d0932a5dc5b7f6b2bef3357e5ae4ed9847fd58eb5a7e6999cefbe8623656620fc7d98f9e379bcec3959bc142fd15ed3656fd37f498

  • SSDEEP

    49152:wzME8KgmwI/NMCeOblTVVA0zieRtqIXSD4/:wMEVwENMCeOblTVVA+iefqIXSDy

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      66b0abe9734343c7845b55c205ce2a945192a89fda63b650b9f48e0c3f38c4d0

    • Size

      2.1MB

    • MD5

      23dc9037e637780575a1b87fb3d49489

    • SHA1

      b1c9e8f8ebef84adca575f0b82c3664a905e1794

    • SHA256

      66b0abe9734343c7845b55c205ce2a945192a89fda63b650b9f48e0c3f38c4d0

    • SHA512

      bb516798b6d30d88e4f1d5d0932a5dc5b7f6b2bef3357e5ae4ed9847fd58eb5a7e6999cefbe8623656620fc7d98f9e379bcec3959bc142fd15ed3656fd37f498

    • SSDEEP

      49152:wzME8KgmwI/NMCeOblTVVA0zieRtqIXSD4/:wMEVwENMCeOblTVVA+iefqIXSDy

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks