General

  • Target

    0e4bdbd55510bdbf7b2bd5b02d86ec4738300fd21ab3187e0a8f84dce3f399f4

  • Size

    120KB

  • Sample

    221011-f8j52agfep

  • MD5

    60aa265746f1c97d91db609ed41f19d9

  • SHA1

    4de9f34af9cb617bc0f0459dcfd14ed0305b7aa2

  • SHA256

    0e4bdbd55510bdbf7b2bd5b02d86ec4738300fd21ab3187e0a8f84dce3f399f4

  • SHA512

    9b2b320925b7342ff8ae6a105abc63a0e4f5070b42fa5f00ab5851c6a4c17120d84428e7e424353a3bde3854fd74cbae844d283a1e0e4e766d41830df45f95c5

  • SSDEEP

    3072:Gm5Vy1ZsMce/KKwBrlqT2aOfMYTJDg8v6Um:xWnszePGrkTan

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0e4bdbd55510bdbf7b2bd5b02d86ec4738300fd21ab3187e0a8f84dce3f399f4

    • Size

      120KB

    • MD5

      60aa265746f1c97d91db609ed41f19d9

    • SHA1

      4de9f34af9cb617bc0f0459dcfd14ed0305b7aa2

    • SHA256

      0e4bdbd55510bdbf7b2bd5b02d86ec4738300fd21ab3187e0a8f84dce3f399f4

    • SHA512

      9b2b320925b7342ff8ae6a105abc63a0e4f5070b42fa5f00ab5851c6a4c17120d84428e7e424353a3bde3854fd74cbae844d283a1e0e4e766d41830df45f95c5

    • SSDEEP

      3072:Gm5Vy1ZsMce/KKwBrlqT2aOfMYTJDg8v6Um:xWnszePGrkTan

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks