General

  • Target

    741636c6d03db2c614b38d8fd48ad1f607b2c09a56323575da2d94dcf7c9a6ce

  • Size

    120KB

  • Sample

    240517-ad6snaga83

  • MD5

    e133f88ce39fc934285f30c3cbd4ddac

  • SHA1

    f4a7bcb49799efda5028bb81e77c70e5edbc6a4e

  • SHA256

    741636c6d03db2c614b38d8fd48ad1f607b2c09a56323575da2d94dcf7c9a6ce

  • SHA512

    1fd9cf6240360247d8c3e816488ed3cdf0fbe3baa316ca029ba094d4f7987bf0f9e1575501f88a4f10115e40c48fba3037eccbaeea1568d1afdcc0cd14fadf75

  • SSDEEP

    3072:+sskbVv225cHuRCTzcwZdoz3UZSqOwNHZ3caitoCWXO:+sxV2NtTz5uzkZow33uw

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      741636c6d03db2c614b38d8fd48ad1f607b2c09a56323575da2d94dcf7c9a6ce

    • Size

      120KB

    • MD5

      e133f88ce39fc934285f30c3cbd4ddac

    • SHA1

      f4a7bcb49799efda5028bb81e77c70e5edbc6a4e

    • SHA256

      741636c6d03db2c614b38d8fd48ad1f607b2c09a56323575da2d94dcf7c9a6ce

    • SHA512

      1fd9cf6240360247d8c3e816488ed3cdf0fbe3baa316ca029ba094d4f7987bf0f9e1575501f88a4f10115e40c48fba3037eccbaeea1568d1afdcc0cd14fadf75

    • SSDEEP

      3072:+sskbVv225cHuRCTzcwZdoz3UZSqOwNHZ3caitoCWXO:+sxV2NtTz5uzkZow33uw

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks