General

  • Target

    ac575499e06f03ced743d4eb27007576727e71c2f1ae2ef6b60fa7104930063d

  • Size

    120KB

  • Sample

    240525-cevswsaf91

  • MD5

    2e5184afb9fd706964a05d466bde8048

  • SHA1

    045d483a166de8a6dbe359ad13cb16367fb5b6f0

  • SHA256

    ac575499e06f03ced743d4eb27007576727e71c2f1ae2ef6b60fa7104930063d

  • SHA512

    eee6e3e7210af5fee15524bc9b9c77ed8fed82da53b734aab9c1e6faee9333247de12d87616f61f8a514c6174be04baf54b7081695b96c9b9ca3454f7a5abba9

  • SSDEEP

    3072:7WNF5FTsKP6pOQxngMglIvKP4Feg2GeOcHOFQG8h:KFrslEQxngTavMZ+DFB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ac575499e06f03ced743d4eb27007576727e71c2f1ae2ef6b60fa7104930063d

    • Size

      120KB

    • MD5

      2e5184afb9fd706964a05d466bde8048

    • SHA1

      045d483a166de8a6dbe359ad13cb16367fb5b6f0

    • SHA256

      ac575499e06f03ced743d4eb27007576727e71c2f1ae2ef6b60fa7104930063d

    • SHA512

      eee6e3e7210af5fee15524bc9b9c77ed8fed82da53b734aab9c1e6faee9333247de12d87616f61f8a514c6174be04baf54b7081695b96c9b9ca3454f7a5abba9

    • SSDEEP

      3072:7WNF5FTsKP6pOQxngMglIvKP4Feg2GeOcHOFQG8h:KFrslEQxngTavMZ+DFB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks