General

  • Target

    a598694cb30b31fcc21e8b1b2b93e0ca34b5484652b5edf7a39ce3e6a81c375b.exe

  • Size

    100KB

  • Sample

    241226-he3rdsyngz

  • MD5

    4fd18d008652ec0810eaf854802480dc

  • SHA1

    8c044c4d22b0a5b01aea5618c6b5042539da97c8

  • SHA256

    a598694cb30b31fcc21e8b1b2b93e0ca34b5484652b5edf7a39ce3e6a81c375b

  • SHA512

    94592f495f0e985dc1bcc28bda5f27c422ec126474d97375b676c955b021f805d9a82dec3368925d2aa4721c17411f8d4300bc4ffa64c31bb6c057803c35fde2

  • SSDEEP

    1536:LTDSk5VN/n7ChnerRIAI0qRkxUKLcnsurli1RaZY80s:dn7Wne1IxCpL2MTc5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      a598694cb30b31fcc21e8b1b2b93e0ca34b5484652b5edf7a39ce3e6a81c375b.exe

    • Size

      100KB

    • MD5

      4fd18d008652ec0810eaf854802480dc

    • SHA1

      8c044c4d22b0a5b01aea5618c6b5042539da97c8

    • SHA256

      a598694cb30b31fcc21e8b1b2b93e0ca34b5484652b5edf7a39ce3e6a81c375b

    • SHA512

      94592f495f0e985dc1bcc28bda5f27c422ec126474d97375b676c955b021f805d9a82dec3368925d2aa4721c17411f8d4300bc4ffa64c31bb6c057803c35fde2

    • SSDEEP

      1536:LTDSk5VN/n7ChnerRIAI0qRkxUKLcnsurli1RaZY80s:dn7Wne1IxCpL2MTc5

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks