General

  • Target

    916f2131c8aafa0af34913cf38db4998f7065fb8f612eb6462bca0dbb7df15e0

  • Size

    120KB

  • Sample

    240421-aw5nbaee4t

  • MD5

    4871afdf1ffe3919b4142b15cbc770af

  • SHA1

    352297ccd6f29d85f4c0f0aab6c53ccacbbb192a

  • SHA256

    916f2131c8aafa0af34913cf38db4998f7065fb8f612eb6462bca0dbb7df15e0

  • SHA512

    2c9ada0a95f21d32da865ac0bb408495dc3819f600e44ffa4404daf7e6a37cda4064a7cec3c0c68e6ac5173f7d927f955297285a144cf51122baf20e64742030

  • SSDEEP

    3072:Z9ys/Urv0M9w1ibE3FlWI8rP18xYK1BZ9Cq:S04bo8z18xL9Cq

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      916f2131c8aafa0af34913cf38db4998f7065fb8f612eb6462bca0dbb7df15e0

    • Size

      120KB

    • MD5

      4871afdf1ffe3919b4142b15cbc770af

    • SHA1

      352297ccd6f29d85f4c0f0aab6c53ccacbbb192a

    • SHA256

      916f2131c8aafa0af34913cf38db4998f7065fb8f612eb6462bca0dbb7df15e0

    • SHA512

      2c9ada0a95f21d32da865ac0bb408495dc3819f600e44ffa4404daf7e6a37cda4064a7cec3c0c68e6ac5173f7d927f955297285a144cf51122baf20e64742030

    • SSDEEP

      3072:Z9ys/Urv0M9w1ibE3FlWI8rP18xYK1BZ9Cq:S04bo8z18xL9Cq

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks