General

  • Target

    52771cb21078a439604b657de1a20209491dac2d2e4ceadfffe90b4689ce0f86N.exe

  • Size

    212KB

  • Sample

    250201-tv1shsslap

  • MD5

    d6b0ce968c3cf807203f48aecd811590

  • SHA1

    09fcfccefe4d42a8f48b287d34c29fb3669ddf02

  • SHA256

    52771cb21078a439604b657de1a20209491dac2d2e4ceadfffe90b4689ce0f86

  • SHA512

    8d374a23b57fc6334b8520e8e504a822ff4bd983b695691446757f3c67feb1e5fd49b1dcf5e3607827615a2e1dc42986b887a76a4bab1e9b7ec9d4ae6107488b

  • SSDEEP

    3072:c4/Wd8bsXQJl5v1l83PAUKpHqzQMyU6x2cgMRRvzcuNj5hDpqko:c4/23XQJ8IUKpHIQMyUpPMRRz1LPo

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      52771cb21078a439604b657de1a20209491dac2d2e4ceadfffe90b4689ce0f86N.exe

    • Size

      212KB

    • MD5

      d6b0ce968c3cf807203f48aecd811590

    • SHA1

      09fcfccefe4d42a8f48b287d34c29fb3669ddf02

    • SHA256

      52771cb21078a439604b657de1a20209491dac2d2e4ceadfffe90b4689ce0f86

    • SHA512

      8d374a23b57fc6334b8520e8e504a822ff4bd983b695691446757f3c67feb1e5fd49b1dcf5e3607827615a2e1dc42986b887a76a4bab1e9b7ec9d4ae6107488b

    • SSDEEP

      3072:c4/Wd8bsXQJl5v1l83PAUKpHqzQMyU6x2cgMRRvzcuNj5hDpqko:c4/23XQJ8IUKpHIQMyUpPMRRz1LPo

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.