General

  • Target

    9d4b9a04b0dad74e3c396b2e7e5796919857723aca114a37d2742e8acf77b439N.exe

  • Size

    65KB

  • Sample

    250201-yn4m2szjbp

  • MD5

    ad31bbaf14debfef31aabe267ecc08a0

  • SHA1

    0eb6b1248d80c5394196c7fab3d7d523e18bcedb

  • SHA256

    9d4b9a04b0dad74e3c396b2e7e5796919857723aca114a37d2742e8acf77b439

  • SHA512

    fcc8335e461c414426180a1a860e602a3343009919fc6432e6b87f1883a99081f63ec82f95906671b9ba2eed50e8611c2f9a3466d34ef20a8dbfad08f0d0a899

  • SSDEEP

    1536:8WpfIvCo95xtABh6jvqbgVm7a1g1KBf1jq1JH:8QCx79jviXu1Z5xqj

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      9d4b9a04b0dad74e3c396b2e7e5796919857723aca114a37d2742e8acf77b439N.exe

    • Size

      65KB

    • MD5

      ad31bbaf14debfef31aabe267ecc08a0

    • SHA1

      0eb6b1248d80c5394196c7fab3d7d523e18bcedb

    • SHA256

      9d4b9a04b0dad74e3c396b2e7e5796919857723aca114a37d2742e8acf77b439

    • SHA512

      fcc8335e461c414426180a1a860e602a3343009919fc6432e6b87f1883a99081f63ec82f95906671b9ba2eed50e8611c2f9a3466d34ef20a8dbfad08f0d0a899

    • SSDEEP

      1536:8WpfIvCo95xtABh6jvqbgVm7a1g1KBf1jq1JH:8QCx79jviXu1Z5xqj

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks