General

  • Target

    613a2b3d338439151bc565a60c8a4ce03c97ce71b594e4ada29659a46e0b75c3.exe

  • Size

    65KB

  • Sample

    241217-z6vzaszjbn

  • MD5

    0636e3027bfa59dae1ef95a4e6f191d1

  • SHA1

    64eab731d84ff175fce5123523d14b59cd443077

  • SHA256

    613a2b3d338439151bc565a60c8a4ce03c97ce71b594e4ada29659a46e0b75c3

  • SHA512

    8ea30fa859c6c2a455d93c07888c27570e7ed1865db1ef963bc37e3919806228e0bda36fc613039107d65a9e23dba0fd1eae6092462caa07d0ef2109496fec2c

  • SSDEEP

    1536:WTlEXdxhp9z5+BvOlTSeQXYwRqu0a72qi2A20C0vCJsgB1o8jqu:Wuxhp9z5HSlIqq02qig7mCJsgB1HWu

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      613a2b3d338439151bc565a60c8a4ce03c97ce71b594e4ada29659a46e0b75c3.exe

    • Size

      65KB

    • MD5

      0636e3027bfa59dae1ef95a4e6f191d1

    • SHA1

      64eab731d84ff175fce5123523d14b59cd443077

    • SHA256

      613a2b3d338439151bc565a60c8a4ce03c97ce71b594e4ada29659a46e0b75c3

    • SHA512

      8ea30fa859c6c2a455d93c07888c27570e7ed1865db1ef963bc37e3919806228e0bda36fc613039107d65a9e23dba0fd1eae6092462caa07d0ef2109496fec2c

    • SSDEEP

      1536:WTlEXdxhp9z5+BvOlTSeQXYwRqu0a72qi2A20C0vCJsgB1o8jqu:Wuxhp9z5HSlIqq02qig7mCJsgB1HWu

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks