General

  • Target

    8cd38f5e32d0f58b46dfc62c388a99c65a040133aa6c8d10f5d2638cdd9b719b

  • Size

    65KB

  • Sample

    241220-dpkw4sxpbz

  • MD5

    6fd86ccadebf6700b9721306270fc56d

  • SHA1

    2c5429210c05bc0e66ae6158de219b99fe212b7f

  • SHA256

    8cd38f5e32d0f58b46dfc62c388a99c65a040133aa6c8d10f5d2638cdd9b719b

  • SHA512

    17f20f8f42eaeab2e6df7f8aa16f7d779ddcb4ce9fdaea5b61e15b1fc88e58adb711a59249f2baeef4fe9eaae47ab3d94601354a19c3c37d0ea4458faba3ec66

  • SSDEEP

    1536:TwhjV+0YQM7fMt1o4ukNOBFqi4fVk54HMn4ep3nbC1x:TwtVtYE1o4uvquyHM4eix

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8cd38f5e32d0f58b46dfc62c388a99c65a040133aa6c8d10f5d2638cdd9b719b

    • Size

      65KB

    • MD5

      6fd86ccadebf6700b9721306270fc56d

    • SHA1

      2c5429210c05bc0e66ae6158de219b99fe212b7f

    • SHA256

      8cd38f5e32d0f58b46dfc62c388a99c65a040133aa6c8d10f5d2638cdd9b719b

    • SHA512

      17f20f8f42eaeab2e6df7f8aa16f7d779ddcb4ce9fdaea5b61e15b1fc88e58adb711a59249f2baeef4fe9eaae47ab3d94601354a19c3c37d0ea4458faba3ec66

    • SSDEEP

      1536:TwhjV+0YQM7fMt1o4ukNOBFqi4fVk54HMn4ep3nbC1x:TwtVtYE1o4uvquyHM4eix

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks