General

  • Target

    6ea53e0a6118111b3a46be3c270a872a8e5b9d44ba1012b8d0fa6dfa6fb47ecd.exe

  • Size

    65KB

  • Sample

    241226-azjj9asmgw

  • MD5

    4e2ddc443e9695881d5e6c495eca5eab

  • SHA1

    7a06e9b971505c41bccd6853dd9d6be51672d3e2

  • SHA256

    6ea53e0a6118111b3a46be3c270a872a8e5b9d44ba1012b8d0fa6dfa6fb47ecd

  • SHA512

    26a2603f8d288f6a86dae315afa3c36fa3343e22b1d91ac67df9fd3a6fad2129ec00ade22f3090baaa1a50f5793f2e4314d8ae710c68dc5795c75983ab1c0e71

  • SSDEEP

    1536:t2FujAR5sqv57+yv9qm5MCg7ksCW5EPR59RiSByB:0ujY5dv57+yp5vXWARNxByB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      6ea53e0a6118111b3a46be3c270a872a8e5b9d44ba1012b8d0fa6dfa6fb47ecd.exe

    • Size

      65KB

    • MD5

      4e2ddc443e9695881d5e6c495eca5eab

    • SHA1

      7a06e9b971505c41bccd6853dd9d6be51672d3e2

    • SHA256

      6ea53e0a6118111b3a46be3c270a872a8e5b9d44ba1012b8d0fa6dfa6fb47ecd

    • SHA512

      26a2603f8d288f6a86dae315afa3c36fa3343e22b1d91ac67df9fd3a6fad2129ec00ade22f3090baaa1a50f5793f2e4314d8ae710c68dc5795c75983ab1c0e71

    • SSDEEP

      1536:t2FujAR5sqv57+yv9qm5MCg7ksCW5EPR59RiSByB:0ujY5dv57+yp5vXWARNxByB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks