General

  • Target

    657c569d979cab01777476413c36cefce1b26efd165dcef6efcc4d9f71e63534

  • Size

    120KB

  • Sample

    240525-2f384add82

  • MD5

    57174b61a9f9c01790b74a83e3a8ab63

  • SHA1

    5231bedd1ad0254cea1aaca5d3bb3d143d7c80da

  • SHA256

    657c569d979cab01777476413c36cefce1b26efd165dcef6efcc4d9f71e63534

  • SHA512

    ff0b89219864381ce6fdb76e7aca630c708e79888634ddeef8b4c41e616452966351ad39b098b7cc6382a09f26230c592458965625054751156466ea7fc59498

  • SSDEEP

    3072:iwMmE7AP/BMvpnIzCdasFgsBc+ROWvfQ9vhFx5:omE7AnCVRysBr06fQjFx

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      657c569d979cab01777476413c36cefce1b26efd165dcef6efcc4d9f71e63534

    • Size

      120KB

    • MD5

      57174b61a9f9c01790b74a83e3a8ab63

    • SHA1

      5231bedd1ad0254cea1aaca5d3bb3d143d7c80da

    • SHA256

      657c569d979cab01777476413c36cefce1b26efd165dcef6efcc4d9f71e63534

    • SHA512

      ff0b89219864381ce6fdb76e7aca630c708e79888634ddeef8b4c41e616452966351ad39b098b7cc6382a09f26230c592458965625054751156466ea7fc59498

    • SSDEEP

      3072:iwMmE7AP/BMvpnIzCdasFgsBc+ROWvfQ9vhFx5:omE7AnCVRysBr06fQjFx

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks