General

  • Target

    97334fcd7b6bc35584dc89c91568a32b9068ee5a8fbbf91d42806eff899a32fe

  • Size

    160KB

  • Sample

    241203-y37y1sxpek

  • MD5

    fee217672f9ad461b853307bf712ac8a

  • SHA1

    f3551c39c8788be01e6137a6e0394ad8c501b1fe

  • SHA256

    97334fcd7b6bc35584dc89c91568a32b9068ee5a8fbbf91d42806eff899a32fe

  • SHA512

    3b38417c205fdab45fda24c83ec40c24ad2b747bf068ed05af7b966cc4a0a9dee0c3e9cd024f6d3d835a80e83e55a60671378cf77de19a345ee9ae03773276fe

  • SSDEEP

    3072:rkQ8rWCQmF/pstBaDqwONnct437Bl3N2Uu7phmDP4KF5VdwkXJN41ccl:rkQ8ihmF/p/uwONct43j92UaOj4K/VdC

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      97334fcd7b6bc35584dc89c91568a32b9068ee5a8fbbf91d42806eff899a32fe

    • Size

      160KB

    • MD5

      fee217672f9ad461b853307bf712ac8a

    • SHA1

      f3551c39c8788be01e6137a6e0394ad8c501b1fe

    • SHA256

      97334fcd7b6bc35584dc89c91568a32b9068ee5a8fbbf91d42806eff899a32fe

    • SHA512

      3b38417c205fdab45fda24c83ec40c24ad2b747bf068ed05af7b966cc4a0a9dee0c3e9cd024f6d3d835a80e83e55a60671378cf77de19a345ee9ae03773276fe

    • SSDEEP

      3072:rkQ8rWCQmF/pstBaDqwONnct437Bl3N2Uu7phmDP4KF5VdwkXJN41ccl:rkQ8ihmF/p/uwONct43j92UaOj4K/VdC

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks