General

  • Target

    dc81da80935ad5c28c1da35a74c4f11562a86ded2ee14189109df1eba88b8031.exe

  • Size

    97KB

  • Sample

    241231-vtzphasrbq

  • MD5

    7aa2997c070fa9e1eaa8fa756d6e85f4

  • SHA1

    80c04647bdd036be4d23026ba2abef7453f31874

  • SHA256

    dc81da80935ad5c28c1da35a74c4f11562a86ded2ee14189109df1eba88b8031

  • SHA512

    fbd8b3145fe5f081e4c79164d2675dd32c3a75b649881533c2c1eaf513793c959c1f57a8c545be2b332cbcc0eb6a5f46c21c39dd6b9107523a204959092f3168

  • SSDEEP

    1536:j6Jb6AoUPdOZyrN1AuqjbujHoVcVcOKK8PlaULxXDsABMOz15AfA:mN6AJfAnjCjIfpoUlTZ15z

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      dc81da80935ad5c28c1da35a74c4f11562a86ded2ee14189109df1eba88b8031.exe

    • Size

      97KB

    • MD5

      7aa2997c070fa9e1eaa8fa756d6e85f4

    • SHA1

      80c04647bdd036be4d23026ba2abef7453f31874

    • SHA256

      dc81da80935ad5c28c1da35a74c4f11562a86ded2ee14189109df1eba88b8031

    • SHA512

      fbd8b3145fe5f081e4c79164d2675dd32c3a75b649881533c2c1eaf513793c959c1f57a8c545be2b332cbcc0eb6a5f46c21c39dd6b9107523a204959092f3168

    • SSDEEP

      1536:j6Jb6AoUPdOZyrN1AuqjbujHoVcVcOKK8PlaULxXDsABMOz15AfA:mN6AJfAnjCjIfpoUlTZ15z

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks