General

  • Target

    2f5851fe63df00ae8d7d4ed9fdfc09a5a30e9854cfe8f30c4d2931f4cf983558

  • Size

    4.9MB

  • Sample

    230903-w9mwbabd9v

  • MD5

    ca42923db507cd1ddc781561e6009cfc

  • SHA1

    05619295033c8df5f24e71a2924e6d5a60a3fbf4

  • SHA256

    2f5851fe63df00ae8d7d4ed9fdfc09a5a30e9854cfe8f30c4d2931f4cf983558

  • SHA512

    83b93eedefc7b980a025f73050398e01ce116f84a020469d5e9c791d913a4db973d67498fdf2ea01242c66a1ad810b0bf25854f8178e61ab80dbbcedab40e4a2

  • SSDEEP

    98304:X2ONi+29K/WE9PhBGjohAInvqIKofZP5UyeAQQm4OTb12pcFS+fRXN/f0ykSJf+h:X4+SK9hh4M5v9fZP5UNDcOnMp0xN/8dJ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2f5851fe63df00ae8d7d4ed9fdfc09a5a30e9854cfe8f30c4d2931f4cf983558

    • Size

      4.9MB

    • MD5

      ca42923db507cd1ddc781561e6009cfc

    • SHA1

      05619295033c8df5f24e71a2924e6d5a60a3fbf4

    • SHA256

      2f5851fe63df00ae8d7d4ed9fdfc09a5a30e9854cfe8f30c4d2931f4cf983558

    • SHA512

      83b93eedefc7b980a025f73050398e01ce116f84a020469d5e9c791d913a4db973d67498fdf2ea01242c66a1ad810b0bf25854f8178e61ab80dbbcedab40e4a2

    • SSDEEP

      98304:X2ONi+29K/WE9PhBGjohAInvqIKofZP5UyeAQQm4OTb12pcFS+fRXN/f0ykSJf+h:X4+SK9hh4M5v9fZP5UNDcOnMp0xN/8dJ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks