General

  • Target

    ef6e3beead2e450a305d680fae58e5a8389df2a61c13adc9adecdc291630af0f

  • Size

    105KB

  • Sample

    241230-e4et3syjfp

  • MD5

    dd1bd6c587b2c23243c0ee9b7884f032

  • SHA1

    95c908302b7089f706f8d440fbb0c23a932bfb5b

  • SHA256

    ef6e3beead2e450a305d680fae58e5a8389df2a61c13adc9adecdc291630af0f

  • SHA512

    b4e9280fdbf191849d0d9c7814689168e58d4d4540cc0e9322d48cf792dc3ef9a8b40dac8e9d1819286ffc668ff511ed2010889027370dcef071fa6f00b0dd9d

  • SSDEEP

    3072:8XuipLN5/YTSvPOg/rEhyRAcH6xDjCHcilHqR:qpZNYTSXBjEsv6VjUDHC

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ef6e3beead2e450a305d680fae58e5a8389df2a61c13adc9adecdc291630af0f

    • Size

      105KB

    • MD5

      dd1bd6c587b2c23243c0ee9b7884f032

    • SHA1

      95c908302b7089f706f8d440fbb0c23a932bfb5b

    • SHA256

      ef6e3beead2e450a305d680fae58e5a8389df2a61c13adc9adecdc291630af0f

    • SHA512

      b4e9280fdbf191849d0d9c7814689168e58d4d4540cc0e9322d48cf792dc3ef9a8b40dac8e9d1819286ffc668ff511ed2010889027370dcef071fa6f00b0dd9d

    • SSDEEP

      3072:8XuipLN5/YTSvPOg/rEhyRAcH6xDjCHcilHqR:qpZNYTSXBjEsv6VjUDHC

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks