General

  • Target

    9070f7ff041aa3677a9734e9c85ee1c0d239f41e998e1b551a843a9751c56fc4.exe

  • Size

    184KB

  • Sample

    250205-p8xkssynep

  • MD5

    3f1a9574d230dc5f0e8e95c5619c3b79

  • SHA1

    a52570de1a652148e6ec84e732d50ab48611b7d2

  • SHA256

    9070f7ff041aa3677a9734e9c85ee1c0d239f41e998e1b551a843a9751c56fc4

  • SHA512

    7fda4142952ee0cdd41ba6d8a0349391ab2b813561d18431f210194fe9d981196c2a3cef2017e10d60500640aab0a20fa3c6bc19bdb88cb1a0459102f84058c6

  • SSDEEP

    3072:imZWXyaiedMbrN6LnoXPBsr5ZrAdBB7n78IXcxc0Ulqin1SPTV:iSNaPM4boo5ZUt778wcO0Ull1Sp

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      9070f7ff041aa3677a9734e9c85ee1c0d239f41e998e1b551a843a9751c56fc4.exe

    • Size

      184KB

    • MD5

      3f1a9574d230dc5f0e8e95c5619c3b79

    • SHA1

      a52570de1a652148e6ec84e732d50ab48611b7d2

    • SHA256

      9070f7ff041aa3677a9734e9c85ee1c0d239f41e998e1b551a843a9751c56fc4

    • SHA512

      7fda4142952ee0cdd41ba6d8a0349391ab2b813561d18431f210194fe9d981196c2a3cef2017e10d60500640aab0a20fa3c6bc19bdb88cb1a0459102f84058c6

    • SSDEEP

      3072:imZWXyaiedMbrN6LnoXPBsr5ZrAdBB7n78IXcxc0Ulqin1SPTV:iSNaPM4boo5ZUt778wcO0Ull1Sp

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks