General

  • Target

    2024-12-20_919fd9bca2e1771bd599f08b60984a36_xiaoba

  • Size

    4.9MB

  • Sample

    241220-jjze7strbj

  • MD5

    919fd9bca2e1771bd599f08b60984a36

  • SHA1

    404d1583c6c8662f2afc003deb7d270c585670c8

  • SHA256

    62d9396786af0ef79b4decd091f2263eb323e3649cac9aba2dd30658afc4a43b

  • SHA512

    386fcfb247657774f72c09a7afd24aa6ed93bfa4fd5c2a3e89d904d6d74bf2ca3e4f771605dc944f83f3133580dca7332ff857b298f0afae56cbace2b0f06387

  • SSDEEP

    49152:qB890byazXfiJhI8Fx82VixxkkmYR//+k6qHu/NhoFpdu+CszhQ1T81/SOIaf/dA:uNfzvmI6Voxk6RVpdu+C+qKRuGU7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2024-12-20_919fd9bca2e1771bd599f08b60984a36_xiaoba

    • Size

      4.9MB

    • MD5

      919fd9bca2e1771bd599f08b60984a36

    • SHA1

      404d1583c6c8662f2afc003deb7d270c585670c8

    • SHA256

      62d9396786af0ef79b4decd091f2263eb323e3649cac9aba2dd30658afc4a43b

    • SHA512

      386fcfb247657774f72c09a7afd24aa6ed93bfa4fd5c2a3e89d904d6d74bf2ca3e4f771605dc944f83f3133580dca7332ff857b298f0afae56cbace2b0f06387

    • SSDEEP

      49152:qB890byazXfiJhI8Fx82VixxkkmYR//+k6qHu/NhoFpdu+CszhQ1T81/SOIaf/dA:uNfzvmI6Voxk6RVpdu+C+qKRuGU7

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks