General

  • Target

    2025-03-30_91a418da34323e2e077e37f2bc21fc60_amadey_rhadamanthys_smoke-loader

  • Size

    272KB

  • Sample

    250330-jjmfmstscx

  • MD5

    91a418da34323e2e077e37f2bc21fc60

  • SHA1

    b0183da5e81deb00d360d7c7819f44c8bd59935a

  • SHA256

    f46bd6698f36cca1604d548507137195598bbf8c8696a238587059c6b4708ce8

  • SHA512

    68227d900e6d3d89d9a72adb233774175d1473979eb24f9afb5f54227ebff89beb0419e797bc31dad135e1bab50b8d270a77a999b1fd8491d9696864ef50bf38

  • SSDEEP

    6144:ILlDX3DWCE/wKI8Ky/1LlDX3YfFLkVO8A1X2oA:IxDjqbI5W1xD4yMJ1X2oA

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2025-03-30_91a418da34323e2e077e37f2bc21fc60_amadey_rhadamanthys_smoke-loader

    • Size

      272KB

    • MD5

      91a418da34323e2e077e37f2bc21fc60

    • SHA1

      b0183da5e81deb00d360d7c7819f44c8bd59935a

    • SHA256

      f46bd6698f36cca1604d548507137195598bbf8c8696a238587059c6b4708ce8

    • SHA512

      68227d900e6d3d89d9a72adb233774175d1473979eb24f9afb5f54227ebff89beb0419e797bc31dad135e1bab50b8d270a77a999b1fd8491d9696864ef50bf38

    • SSDEEP

      6144:ILlDX3DWCE/wKI8Ky/1LlDX3YfFLkVO8A1X2oA:IxDjqbI5W1xD4yMJ1X2oA

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks