General

  • Target

    c5e7155f54a75a58daf24f7b951b5053805c1a4dc9c53d1445a296707c99ce88.exe

  • Size

    778KB

  • Sample

    241216-1s4jysskdl

  • MD5

    f63b0c10076dc2f6fff29e190a771f45

  • SHA1

    f37648435f16888e93dcb8682e0be232955d7efd

  • SHA256

    c5e7155f54a75a58daf24f7b951b5053805c1a4dc9c53d1445a296707c99ce88

  • SHA512

    cbc41bddd13dfbc813cee1cd434ca8e758cccfee445f830ce60144e4edc5e3017914f76bf8c8e92793b8ea8f3edbfc5312d7c9bc9629d5c7e7ac9e3f31c7d065

  • SSDEEP

    12288:G/Y60aUzs0gHCSL7FkTaSKYwN33QY9nDXruPHGtY59OE:kl0gHCSdkTYwMzaG+59t

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      c5e7155f54a75a58daf24f7b951b5053805c1a4dc9c53d1445a296707c99ce88.exe

    • Size

      778KB

    • MD5

      f63b0c10076dc2f6fff29e190a771f45

    • SHA1

      f37648435f16888e93dcb8682e0be232955d7efd

    • SHA256

      c5e7155f54a75a58daf24f7b951b5053805c1a4dc9c53d1445a296707c99ce88

    • SHA512

      cbc41bddd13dfbc813cee1cd434ca8e758cccfee445f830ce60144e4edc5e3017914f76bf8c8e92793b8ea8f3edbfc5312d7c9bc9629d5c7e7ac9e3f31c7d065

    • SSDEEP

      12288:G/Y60aUzs0gHCSL7FkTaSKYwN33QY9nDXruPHGtY59OE:kl0gHCSdkTYwMzaG+59t

    • Modifies firewall policy service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks