General

  • Target

    8c43aa47fe774214818ca5d2581c1ee07e0effde2a24a34090b53b26e26bc294N.exe

  • Size

    97KB

  • Sample

    241207-2jhfsssqfr

  • MD5

    8182e31485328b07319d4f381d7c0710

  • SHA1

    992adf07d6168ab1c01dc297d86ba7b3e0d5ac8b

  • SHA256

    8c43aa47fe774214818ca5d2581c1ee07e0effde2a24a34090b53b26e26bc294

  • SHA512

    5207f2e9e58003c9c423662d0d4973da5a3c09d0632a9741c30ba3963baa52d3cc47f4c603a4a2746c35626cc15ad104b85c6e112048da0537488782a3d0ea5f

  • SSDEEP

    1536:lXAnPwtQfh/gLZlA2jYblDV/W/Y7/a8On6burwrYtKfkL8tiQhVdBU3:OnPwtKh/UA6YZJW8rwEu6kL8vVdO

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8c43aa47fe774214818ca5d2581c1ee07e0effde2a24a34090b53b26e26bc294N.exe

    • Size

      97KB

    • MD5

      8182e31485328b07319d4f381d7c0710

    • SHA1

      992adf07d6168ab1c01dc297d86ba7b3e0d5ac8b

    • SHA256

      8c43aa47fe774214818ca5d2581c1ee07e0effde2a24a34090b53b26e26bc294

    • SHA512

      5207f2e9e58003c9c423662d0d4973da5a3c09d0632a9741c30ba3963baa52d3cc47f4c603a4a2746c35626cc15ad104b85c6e112048da0537488782a3d0ea5f

    • SSDEEP

      1536:lXAnPwtQfh/gLZlA2jYblDV/W/Y7/a8On6burwrYtKfkL8tiQhVdBU3:OnPwtKh/UA6YZJW8rwEu6kL8vVdO

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks