General

  • Target

    7d440fcb1790c2a8ad250b16d3d6a408410b1e4e71b540982310985be4a635c7

  • Size

    120KB

  • Sample

    240517-awdvlahc62

  • MD5

    48b7f1a3458b620248b23b79ee719d68

  • SHA1

    fc518e6ae559c849bded30bf0fdb6b4b70fd157f

  • SHA256

    7d440fcb1790c2a8ad250b16d3d6a408410b1e4e71b540982310985be4a635c7

  • SHA512

    2e14e0a5e1965ddcbf0f397e9a1c70437d0238d52b6270005e459013b2c723fc7b6acfbcd2b79fbaf43d1e4dfe718f0424d926d9fa032939982f07d5b3ca67dc

  • SSDEEP

    3072:h7JuEjLtvurnVz9snGYT03/lkqRz0NVN5a1wrV18q:35j9urnVz9sGXn0NVNo1218

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      7d440fcb1790c2a8ad250b16d3d6a408410b1e4e71b540982310985be4a635c7

    • Size

      120KB

    • MD5

      48b7f1a3458b620248b23b79ee719d68

    • SHA1

      fc518e6ae559c849bded30bf0fdb6b4b70fd157f

    • SHA256

      7d440fcb1790c2a8ad250b16d3d6a408410b1e4e71b540982310985be4a635c7

    • SHA512

      2e14e0a5e1965ddcbf0f397e9a1c70437d0238d52b6270005e459013b2c723fc7b6acfbcd2b79fbaf43d1e4dfe718f0424d926d9fa032939982f07d5b3ca67dc

    • SSDEEP

      3072:h7JuEjLtvurnVz9snGYT03/lkqRz0NVN5a1wrV18q:35j9urnVz9sGXn0NVNo1218

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks