General

  • Target

    9c71765be4051a2b1c37d794746c60b9aa90cd63a2eab6a7e99b9dc1917cedbd

  • Size

    65KB

  • Sample

    241225-bcp9yssndy

  • MD5

    28e166ea1a60fd07f270a3d4487c70a5

  • SHA1

    c9df59b84e6983c25ba362dd321e93feacc0c7db

  • SHA256

    9c71765be4051a2b1c37d794746c60b9aa90cd63a2eab6a7e99b9dc1917cedbd

  • SHA512

    1f77a0ae973b5bfc7272af3328ff7373a7a05ac19f897612467cb35d96f74f6b4ec413627ecea12293ee86f0a8f3c90ac7d36a0d7bf7f333b2a9a2fa4553eaaf

  • SSDEEP

    1536:ZW/V0TQBgiXiH/J4X7aMZ46L5dxYU9+uMCjgr:YLBgiXiB4X2ef/xyeMr

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      9c71765be4051a2b1c37d794746c60b9aa90cd63a2eab6a7e99b9dc1917cedbd

    • Size

      65KB

    • MD5

      28e166ea1a60fd07f270a3d4487c70a5

    • SHA1

      c9df59b84e6983c25ba362dd321e93feacc0c7db

    • SHA256

      9c71765be4051a2b1c37d794746c60b9aa90cd63a2eab6a7e99b9dc1917cedbd

    • SHA512

      1f77a0ae973b5bfc7272af3328ff7373a7a05ac19f897612467cb35d96f74f6b4ec413627ecea12293ee86f0a8f3c90ac7d36a0d7bf7f333b2a9a2fa4553eaaf

    • SSDEEP

      1536:ZW/V0TQBgiXiH/J4X7aMZ46L5dxYU9+uMCjgr:YLBgiXiB4X2ef/xyeMr

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks