General

  • Target

    c281850c4d406a9da0d1fd719348e21009f5f7cb3be7ffd8daf423728f6b6434.exe

  • Size

    100KB

  • Sample

    250202-ght3zsznhk

  • MD5

    c56158b26e36765b714b453f1b25f6f3

  • SHA1

    8c319986413a243bf1b4b63f8d520dbfcab97222

  • SHA256

    c281850c4d406a9da0d1fd719348e21009f5f7cb3be7ffd8daf423728f6b6434

  • SHA512

    4e70aa963b9f414b282b9276d142914884b1b9416c6fc927f799476a1f3e580cc58257e4c6561618756209351df347f809b0f05671b0a9a7f2cb425bdd91323b

  • SSDEEP

    1536:oPRckuiSfU0tzkfG3fcr7rRmiiiRCY5AIWIRtWggAkZwKEC88la2H:oPDLSBtmGPeAihR5AstZSfU2

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      c281850c4d406a9da0d1fd719348e21009f5f7cb3be7ffd8daf423728f6b6434.exe

    • Size

      100KB

    • MD5

      c56158b26e36765b714b453f1b25f6f3

    • SHA1

      8c319986413a243bf1b4b63f8d520dbfcab97222

    • SHA256

      c281850c4d406a9da0d1fd719348e21009f5f7cb3be7ffd8daf423728f6b6434

    • SHA512

      4e70aa963b9f414b282b9276d142914884b1b9416c6fc927f799476a1f3e580cc58257e4c6561618756209351df347f809b0f05671b0a9a7f2cb425bdd91323b

    • SSDEEP

      1536:oPRckuiSfU0tzkfG3fcr7rRmiiiRCY5AIWIRtWggAkZwKEC88la2H:oPDLSBtmGPeAihR5AstZSfU2

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks