General

  • Target

    MDE_File_Sample_1e50c34ea352ebeb822ad84c89846be424a2648e.zip

  • Size

    78KB

  • Sample

    241212-zv3j1axlhv

  • MD5

    7b06e2b4008fdc57ea85cc0af09da745

  • SHA1

    7b5d9ae0ffd93d815910b76869ce9228fc839590

  • SHA256

    e868cc99796be11a2c0c0753911a804beed1f3d1d2a51b0161c86de10aafc714

  • SHA512

    08985b4188d71661173d39483de30f66b426faf87b3602a619e378557903cf8ee75eecefc29a0d63badbba9aa5ba7efb240c110e680c68d425f63415c0a0d7c1

  • SSDEEP

    1536:Ne+tm8jkjAJ8cKdkRqIw+onI8rpZZnyiQF9T2tUBIWLzWdHm54bw67k0I4/YbF:Ne+g8Qj0MWYJrtATJiw67t/Y5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      mvms.exe

    • Size

      100KB

    • MD5

      8b0952bdd0e396146e7ea4630aa9290e

    • SHA1

      1e50c34ea352ebeb822ad84c89846be424a2648e

    • SHA256

      01b2004dbe685dd4915badfd3cb5aea5bbd9cf318b31bbbea2e7ef9c956ecb0a

    • SHA512

      87cd763838e9f6fed3fe122acbbbb6a86a68af81a07772a8b12536a59f0c1ed17fef805f927e6b37240afe1faee552d7323786e56ed187384df610e0d8fca45b

    • SSDEEP

      1536:T14cUndaODq5IKBVG9QgztOxXVD0GnKyZem2SGrD54ZEXyliAUKAyB:T14JdvDgVGmEAXWGKmeTrD54ZflWy

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks