General

  • Target

    974de2f114b4543a09801747cde6c1684c5cd23e12ccd0c8287766d6065d3cee

  • Size

    120KB

  • Sample

    240526-a86fdagg4w

  • MD5

    05dd850633ea7246a69fbdf9a9cdc75d

  • SHA1

    a891563774aac23084f9ae4f11ac22931180c99c

  • SHA256

    974de2f114b4543a09801747cde6c1684c5cd23e12ccd0c8287766d6065d3cee

  • SHA512

    c737a83ac81f63b0508c6dc1a4080f29dfffe844e9413888de52631b755e0d5f1abdaae6a0cc724b21ad52f9faacc840a0bd8249f74f680b2df4d0ef5202a0ea

  • SSDEEP

    3072:2M6sqyst4JB/k1d9sVCeYG7gteFwChbpTAxU6BB4:2Rmo1f0CMWey6dgQ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      974de2f114b4543a09801747cde6c1684c5cd23e12ccd0c8287766d6065d3cee

    • Size

      120KB

    • MD5

      05dd850633ea7246a69fbdf9a9cdc75d

    • SHA1

      a891563774aac23084f9ae4f11ac22931180c99c

    • SHA256

      974de2f114b4543a09801747cde6c1684c5cd23e12ccd0c8287766d6065d3cee

    • SHA512

      c737a83ac81f63b0508c6dc1a4080f29dfffe844e9413888de52631b755e0d5f1abdaae6a0cc724b21ad52f9faacc840a0bd8249f74f680b2df4d0ef5202a0ea

    • SSDEEP

      3072:2M6sqyst4JB/k1d9sVCeYG7gteFwChbpTAxU6BB4:2Rmo1f0CMWey6dgQ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks