General

  • Target

    522419ea7b51794651c994db341188a86511349f5c9494bd0637744bcd18dccb

  • Size

    165KB

  • Sample

    241203-z227taznap

  • MD5

    dc1e5bd3ad87c9e7d43720110689fb83

  • SHA1

    8de697e917ffa46978ce2031e3f7ffce63ba5837

  • SHA256

    522419ea7b51794651c994db341188a86511349f5c9494bd0637744bcd18dccb

  • SHA512

    219a8130afb1d9d289f7f355b5626337edba6db5a6de927bb19ffc86adcd768f35842939f3e983831f7a33726999cdc532e6a43d8d27104b1c4051f14339b99d

  • SSDEEP

    3072:KQ8bez36mF/pstBaDqwONnct437Bl3N2UG/ukhTotJ9CY3q0bAht8Z:KQ8vmF/p/uwONct43j92Un0TotJ9CY6s

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      522419ea7b51794651c994db341188a86511349f5c9494bd0637744bcd18dccb

    • Size

      165KB

    • MD5

      dc1e5bd3ad87c9e7d43720110689fb83

    • SHA1

      8de697e917ffa46978ce2031e3f7ffce63ba5837

    • SHA256

      522419ea7b51794651c994db341188a86511349f5c9494bd0637744bcd18dccb

    • SHA512

      219a8130afb1d9d289f7f355b5626337edba6db5a6de927bb19ffc86adcd768f35842939f3e983831f7a33726999cdc532e6a43d8d27104b1c4051f14339b99d

    • SSDEEP

      3072:KQ8bez36mF/pstBaDqwONnct437Bl3N2UG/ukhTotJ9CY3q0bAht8Z:KQ8vmF/p/uwONct43j92Un0TotJ9CY6s

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks