General

  • Target

    1a983211ac0536b6ed3fd76b28daf9be02e4d57fdd5fa94604b406d38fb3d557N.exe

  • Size

    65KB

  • Sample

    250202-t94sqazpgv

  • MD5

    ffb0a68413a1a8d53ffa0f112cda1dd0

  • SHA1

    a5f4ae1e2b72557128e2693f71e37e09c39bbc38

  • SHA256

    1a983211ac0536b6ed3fd76b28daf9be02e4d57fdd5fa94604b406d38fb3d557

  • SHA512

    2ab5796002afa1f9496003009a1f6254ee4fd7e28ce0c1c6df35884464182ec75dfb6bb44b4d5adb584b22b4d3504545278f150b799a319a62f7646913b0c499

  • SSDEEP

    1536:+s1UStb0hB07c/dWhTffm55Scmnre8bSqvvvxVRyhUdR:+xbBYqoTffm5ccmrnZvnRsUdR

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1a983211ac0536b6ed3fd76b28daf9be02e4d57fdd5fa94604b406d38fb3d557N.exe

    • Size

      65KB

    • MD5

      ffb0a68413a1a8d53ffa0f112cda1dd0

    • SHA1

      a5f4ae1e2b72557128e2693f71e37e09c39bbc38

    • SHA256

      1a983211ac0536b6ed3fd76b28daf9be02e4d57fdd5fa94604b406d38fb3d557

    • SHA512

      2ab5796002afa1f9496003009a1f6254ee4fd7e28ce0c1c6df35884464182ec75dfb6bb44b4d5adb584b22b4d3504545278f150b799a319a62f7646913b0c499

    • SSDEEP

      1536:+s1UStb0hB07c/dWhTffm55Scmnre8bSqvvvxVRyhUdR:+xbBYqoTffm5ccmrnZvnRsUdR

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks