General

  • Target

    1f02834d540f2b648be5161882fc07d7

  • Size

    120KB

  • Sample

    231225-pt98cachbk

  • MD5

    1f02834d540f2b648be5161882fc07d7

  • SHA1

    5383fa46d5e1d6e2f09bb6b7d92db536f0edf1f0

  • SHA256

    33e4cbe1ad998cd53e67475da114980770f6d192e85900669367e0d4f64c23af

  • SHA512

    ec498f98c8ebebb82fd8ff939731a3d04295fdfc3131c8e25ac70acd7a25aa97ba62ec9ffd714d4379f2e7bcf445f3a83d56642da36c4b882822ccc162f97fae

  • SSDEEP

    1536:/JBfm+CHxc0cc2zRUb8/l08Yd8IV/7ETYEKsf7D6UF3yQeS7Okd6dQziErYeNiup:/+X6Ub8/l0cIVg0G7zZjR7O4eTkmC

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1f02834d540f2b648be5161882fc07d7

    • Size

      120KB

    • MD5

      1f02834d540f2b648be5161882fc07d7

    • SHA1

      5383fa46d5e1d6e2f09bb6b7d92db536f0edf1f0

    • SHA256

      33e4cbe1ad998cd53e67475da114980770f6d192e85900669367e0d4f64c23af

    • SHA512

      ec498f98c8ebebb82fd8ff939731a3d04295fdfc3131c8e25ac70acd7a25aa97ba62ec9ffd714d4379f2e7bcf445f3a83d56642da36c4b882822ccc162f97fae

    • SSDEEP

      1536:/JBfm+CHxc0cc2zRUb8/l08Yd8IV/7ETYEKsf7D6UF3yQeS7Okd6dQziErYeNiup:/+X6Ub8/l0cIVg0G7zZjR7O4eTkmC

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks