General

  • Target

    adf6d812baf46f880321d9b29118b4bd7bedbd45176116acef58f41698e8d95cN.exe

  • Size

    65KB

  • Sample

    241204-1aeswaskdv

  • MD5

    58e88fba39accc5c19cdbbbbd30000a0

  • SHA1

    295d7866efc37c819db9e500a79b885291168609

  • SHA256

    adf6d812baf46f880321d9b29118b4bd7bedbd45176116acef58f41698e8d95c

  • SHA512

    9843b795dc04bb1b8dab03ab94c65b9c6db16b77697a3d5d9513b1dbdd075c9afa9f289ad8c1d355ec4093c26d169572eb33b77a346361f4c165d22b8aad9051

  • SSDEEP

    1536:HI5JXboI22PUL17ptqVLUnonxZ3XUIuNvkCQv:HwXbB22PWNtqRXnLHUHo

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      adf6d812baf46f880321d9b29118b4bd7bedbd45176116acef58f41698e8d95cN.exe

    • Size

      65KB

    • MD5

      58e88fba39accc5c19cdbbbbd30000a0

    • SHA1

      295d7866efc37c819db9e500a79b885291168609

    • SHA256

      adf6d812baf46f880321d9b29118b4bd7bedbd45176116acef58f41698e8d95c

    • SHA512

      9843b795dc04bb1b8dab03ab94c65b9c6db16b77697a3d5d9513b1dbdd075c9afa9f289ad8c1d355ec4093c26d169572eb33b77a346361f4c165d22b8aad9051

    • SSDEEP

      1536:HI5JXboI22PUL17ptqVLUnonxZ3XUIuNvkCQv:HwXbB22PWNtqRXnLHUHo

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks