General

  • Target

    7265321baae43182835066d9ab5a90a5efa1b7a0cb92f106f36429bf1e8371bf

  • Size

    3.9MB

  • Sample

    241215-3qlbpssqbz

  • MD5

    6791d78a1e416823fe4450d05ef9598e

  • SHA1

    3d7842562b0e66cf88ab71a1fba7b482179bdc8c

  • SHA256

    7265321baae43182835066d9ab5a90a5efa1b7a0cb92f106f36429bf1e8371bf

  • SHA512

    49a7cee20aebe106a9cefd9a129ebe81380b0648d89549f8a0eb5819fe12371b0259a55caae879d5327057b8cfd5e086c724becf38ea5d2154b2ffa7e56af50a

  • SSDEEP

    98304:F1D7IVKqo6eTEgiYhuBBYYXomgviswVWNniUlPmnMOAPv:bIVKn6g3huXb7sAWIkUMOsv

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      7265321baae43182835066d9ab5a90a5efa1b7a0cb92f106f36429bf1e8371bf

    • Size

      3.9MB

    • MD5

      6791d78a1e416823fe4450d05ef9598e

    • SHA1

      3d7842562b0e66cf88ab71a1fba7b482179bdc8c

    • SHA256

      7265321baae43182835066d9ab5a90a5efa1b7a0cb92f106f36429bf1e8371bf

    • SHA512

      49a7cee20aebe106a9cefd9a129ebe81380b0648d89549f8a0eb5819fe12371b0259a55caae879d5327057b8cfd5e086c724becf38ea5d2154b2ffa7e56af50a

    • SSDEEP

      98304:F1D7IVKqo6eTEgiYhuBBYYXomgviswVWNniUlPmnMOAPv:bIVKn6g3huXb7sAWIkUMOsv

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks