General

  • Target

    4de272fa3f5ed1a56ab5f31be43abc2c76b82eb2c692e949c2c5b94fb9e69635

  • Size

    120KB

  • Sample

    240526-1d16aacf81

  • MD5

    a7464f2f972ebc35e3fe76c2709a2ea9

  • SHA1

    3fa97205f3557f1366dc5ea327f0f6bfc6f21f66

  • SHA256

    4de272fa3f5ed1a56ab5f31be43abc2c76b82eb2c692e949c2c5b94fb9e69635

  • SHA512

    27feec62aa5935c8de403c67a159d51a861b7345d549ba1d14577d8159b00dab08210cbcd5114c35143da967df7f62c95509d68d2813972cb88c73466afea2db

  • SSDEEP

    3072:ltql22FQPyFYuLENTEvDhAl2Hp8FL/cf:WlHQPyakETEvD2lGU

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4de272fa3f5ed1a56ab5f31be43abc2c76b82eb2c692e949c2c5b94fb9e69635

    • Size

      120KB

    • MD5

      a7464f2f972ebc35e3fe76c2709a2ea9

    • SHA1

      3fa97205f3557f1366dc5ea327f0f6bfc6f21f66

    • SHA256

      4de272fa3f5ed1a56ab5f31be43abc2c76b82eb2c692e949c2c5b94fb9e69635

    • SHA512

      27feec62aa5935c8de403c67a159d51a861b7345d549ba1d14577d8159b00dab08210cbcd5114c35143da967df7f62c95509d68d2813972cb88c73466afea2db

    • SSDEEP

      3072:ltql22FQPyFYuLENTEvDhAl2Hp8FL/cf:WlHQPyakETEvD2lGU

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks