General
-
Target
Virus.Win32.Sality.sil-be9485c5201cfbdd43855e7135a10d2fbe3711d073dee324ff2af3d53c4544e0
-
Size
183KB
-
Sample
240229-pwcd4ahf45
-
MD5
22565ed599c5490320b8e06a3b18771c
-
SHA1
14061f2212a29f2ecbbaae39d41bf8f928c4099c
-
SHA256
be9485c5201cfbdd43855e7135a10d2fbe3711d073dee324ff2af3d53c4544e0
-
SHA512
e66a139327b30b69af0daadfa462bcfbc84c65444c1fe8298e9fc1d9de5524c8cf9b6aba2757b94dc7ecfeb3510697e5e80d20711b8aa42a431e2d5712c16b79
-
SSDEEP
3072:C0a2o8/1AWl9XtA6yjuNGhXJec7oMcRjPHJLt9WWIItfjnIRcqD2XK7xkQnN:C52v/1AWl9XtujLkFjlWWrFI4XK9kw
Static task
static1
Behavioral task
behavioral1
Sample
Virus.Win32.Sality.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
Virus.Win32.Sality.sil-be9485c5201cfbdd43855e7135a10d2fbe3711d073dee324ff2af3d53c4544e0
-
Size
183KB
-
MD5
22565ed599c5490320b8e06a3b18771c
-
SHA1
14061f2212a29f2ecbbaae39d41bf8f928c4099c
-
SHA256
be9485c5201cfbdd43855e7135a10d2fbe3711d073dee324ff2af3d53c4544e0
-
SHA512
e66a139327b30b69af0daadfa462bcfbc84c65444c1fe8298e9fc1d9de5524c8cf9b6aba2757b94dc7ecfeb3510697e5e80d20711b8aa42a431e2d5712c16b79
-
SSDEEP
3072:C0a2o8/1AWl9XtA6yjuNGhXJec7oMcRjPHJLt9WWIItfjnIRcqD2XK7xkQnN:C52v/1AWl9XtujLkFjlWWrFI4XK9kw
-
Modifies firewall policy service
-
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
-
UPX dump on OEP (original entry point)
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1