General

  • Target

    833cd61300b62ec1b3f4c3cbe477d8a8f9abbab076b7173345c5b19ff4b3da27

  • Size

    2.0MB

  • Sample

    241230-samvgszqey

  • MD5

    e73844e700be25fffb140418bc615376

  • SHA1

    dd63656749c9b092539680cc18f498c297e6058b

  • SHA256

    833cd61300b62ec1b3f4c3cbe477d8a8f9abbab076b7173345c5b19ff4b3da27

  • SHA512

    263db135089edb78dad9cbf11dd50bc90cd95b5d66603fdfee60c805423ea13b9d511155b9bac38084e81ac3a0526e832d954a78ba7df42b0f3685dd328fe651

  • SSDEEP

    49152:OXzGbLRjLbunYVCHn+EF+/h7lOQ9I8oHyo4vpUosRXChB:OIVjLaYVCHp+/Blr90SoyaRXCb

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      833cd61300b62ec1b3f4c3cbe477d8a8f9abbab076b7173345c5b19ff4b3da27

    • Size

      2.0MB

    • MD5

      e73844e700be25fffb140418bc615376

    • SHA1

      dd63656749c9b092539680cc18f498c297e6058b

    • SHA256

      833cd61300b62ec1b3f4c3cbe477d8a8f9abbab076b7173345c5b19ff4b3da27

    • SHA512

      263db135089edb78dad9cbf11dd50bc90cd95b5d66603fdfee60c805423ea13b9d511155b9bac38084e81ac3a0526e832d954a78ba7df42b0f3685dd328fe651

    • SSDEEP

      49152:OXzGbLRjLbunYVCHn+EF+/h7lOQ9I8oHyo4vpUosRXChB:OIVjLaYVCHp+/Blr90SoyaRXCb

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks