General

  • Target

    91cfd7dc821590d0bf34b5ba379363ce1406fa7201fba6139a0f50147a34cb89

  • Size

    2.6MB

  • Sample

    241206-xzfjxssney

  • MD5

    a72f8d0b9fa89df6926798790b19fd91

  • SHA1

    e68c3a5274eee1437860c40dce37b1d267d8c311

  • SHA256

    91cfd7dc821590d0bf34b5ba379363ce1406fa7201fba6139a0f50147a34cb89

  • SHA512

    27421c12d4bbfdb65df9fc0ef90e7a7725e251e283216a2a8c0bd9c78e4fe9bb87874b67104289fae6bac4a35ca1bf6ac83614e36b391458736261991480270b

  • SSDEEP

    49152:RqeN9mJIwe9X/E4dIzSY3G//Iisfy5lKXgGgMTr6A:II9CIwe9XMcIz72/Qisf6llMTrj

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      91cfd7dc821590d0bf34b5ba379363ce1406fa7201fba6139a0f50147a34cb89

    • Size

      2.6MB

    • MD5

      a72f8d0b9fa89df6926798790b19fd91

    • SHA1

      e68c3a5274eee1437860c40dce37b1d267d8c311

    • SHA256

      91cfd7dc821590d0bf34b5ba379363ce1406fa7201fba6139a0f50147a34cb89

    • SHA512

      27421c12d4bbfdb65df9fc0ef90e7a7725e251e283216a2a8c0bd9c78e4fe9bb87874b67104289fae6bac4a35ca1bf6ac83614e36b391458736261991480270b

    • SSDEEP

      49152:RqeN9mJIwe9X/E4dIzSY3G//Iisfy5lKXgGgMTr6A:II9CIwe9XMcIz72/Qisf6llMTrj

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks