General

  • Target

    a2b2dbc89978ca2ee2653ea023698c0fbb40c9a87a3e4a1d3a636b0bd6fde8a5N.exe

  • Size

    97KB

  • Sample

    241206-x73dnatjcz

  • MD5

    c56d14710d9cd5903dca5854be103c20

  • SHA1

    a86c5e01ae17969456ce2be7edb4d9cd41dd2964

  • SHA256

    a2b2dbc89978ca2ee2653ea023698c0fbb40c9a87a3e4a1d3a636b0bd6fde8a5

  • SHA512

    ebeda7d22560b3b9e5e7bd5f2c3ba67d99217877d8955b33006454425c444c58e5b0ce354ae0c999f79cbe195b26b0c9362302f70e062723db75049839415b78

  • SSDEEP

    1536:YGPzxQVeGXX4Y4qJAi7wJi85PmmIGki92DdiAvoGpqiDJi5JCv0pyCqzon5:YyQB1ATPfdmiAgODJ8CMsCqs5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a2b2dbc89978ca2ee2653ea023698c0fbb40c9a87a3e4a1d3a636b0bd6fde8a5N.exe

    • Size

      97KB

    • MD5

      c56d14710d9cd5903dca5854be103c20

    • SHA1

      a86c5e01ae17969456ce2be7edb4d9cd41dd2964

    • SHA256

      a2b2dbc89978ca2ee2653ea023698c0fbb40c9a87a3e4a1d3a636b0bd6fde8a5

    • SHA512

      ebeda7d22560b3b9e5e7bd5f2c3ba67d99217877d8955b33006454425c444c58e5b0ce354ae0c999f79cbe195b26b0c9362302f70e062723db75049839415b78

    • SSDEEP

      1536:YGPzxQVeGXX4Y4qJAi7wJi85PmmIGki92DdiAvoGpqiDJi5JCv0pyCqzon5:YyQB1ATPfdmiAgODJ8CMsCqs5

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks