General

  • Target

    ca02cb0f4195b235e1730e22e1b87558f13b1387c1fc25b3ce32dfb38ad5a746

  • Size

    169KB

  • Sample

    241203-yzv52sxmfq

  • MD5

    9a6ff64a9c9c425ced2c58af675db279

  • SHA1

    fbad719e1e4bbf7118f5b297fe112aa1af948cf1

  • SHA256

    ca02cb0f4195b235e1730e22e1b87558f13b1387c1fc25b3ce32dfb38ad5a746

  • SHA512

    1144872a842e08f9af25d593afb9b3778233cf8fa84c972f73d327d113f53bd72131aa5ec9e6be624c5f6f377b9932bb4c3d1df135147c15ef94f303c28235d8

  • SSDEEP

    3072:W1omkxdigcajN3FgSF7y3d6zivzUMDwMJaXyaC69ORbYx:WGddigcajN3SSuGlXORkx

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ca02cb0f4195b235e1730e22e1b87558f13b1387c1fc25b3ce32dfb38ad5a746

    • Size

      169KB

    • MD5

      9a6ff64a9c9c425ced2c58af675db279

    • SHA1

      fbad719e1e4bbf7118f5b297fe112aa1af948cf1

    • SHA256

      ca02cb0f4195b235e1730e22e1b87558f13b1387c1fc25b3ce32dfb38ad5a746

    • SHA512

      1144872a842e08f9af25d593afb9b3778233cf8fa84c972f73d327d113f53bd72131aa5ec9e6be624c5f6f377b9932bb4c3d1df135147c15ef94f303c28235d8

    • SSDEEP

      3072:W1omkxdigcajN3FgSF7y3d6zivzUMDwMJaXyaC69ORbYx:WGddigcajN3SSuGlXORkx

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks