General

  • Target

    9ba747519b1bfdc6aa7c4fb9bf7222ebd0c23ea19b3ce392d4c638e1d4e1f023

  • Size

    120KB

  • Sample

    240319-kbcrxafe81

  • MD5

    a658c126edb566d99545aa49ee5b7939

  • SHA1

    15558004f16df732f9f1c2ffa5a2894730251e3f

  • SHA256

    9ba747519b1bfdc6aa7c4fb9bf7222ebd0c23ea19b3ce392d4c638e1d4e1f023

  • SHA512

    e9804dec891b85205d4e256827d8510752ae1388b2d95b1c2662a8c8fa65ec92bdfe2ef9723ab112daf55d9937af2c44e1b27762ae80b15d773e1c3445bbb0df

  • SSDEEP

    1536:QFdLbDDfA7qphEXlelnJ8kr+1U5ILn534mW4FE0ut5xO:QfDfACEVwnJlr+y5yp47cEjtz

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      9ba747519b1bfdc6aa7c4fb9bf7222ebd0c23ea19b3ce392d4c638e1d4e1f023

    • Size

      120KB

    • MD5

      a658c126edb566d99545aa49ee5b7939

    • SHA1

      15558004f16df732f9f1c2ffa5a2894730251e3f

    • SHA256

      9ba747519b1bfdc6aa7c4fb9bf7222ebd0c23ea19b3ce392d4c638e1d4e1f023

    • SHA512

      e9804dec891b85205d4e256827d8510752ae1388b2d95b1c2662a8c8fa65ec92bdfe2ef9723ab112daf55d9937af2c44e1b27762ae80b15d773e1c3445bbb0df

    • SSDEEP

      1536:QFdLbDDfA7qphEXlelnJ8kr+1U5ILn534mW4FE0ut5xO:QfDfACEVwnJlr+y5yp47cEjtz

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks