General

  • Target

    bbeec16cd85d4ca35153bcfd102c2e24c0099ee848c4587126601e99ff91ca95

  • Size

    65KB

  • Sample

    240527-chqcksdd44

  • MD5

    59bef13fe56a84c9c48ca64933d6ed79

  • SHA1

    d68beecee90424443bb229952fc4e2d4a47ede5a

  • SHA256

    bbeec16cd85d4ca35153bcfd102c2e24c0099ee848c4587126601e99ff91ca95

  • SHA512

    30da60a27e1bf8c59e5ba06e6bc4a568bd25b67a938693fb2817a8da98dff27da3d7ddda7fee30adb701562b22f1ff233673951f66e5bcc305071e93f01d7cbd

  • SSDEEP

    1536:R+pp2+oI71Mlh5c3v/WWVWK/me1mfX9f1f+CcwQoqHwf:EppDylh5c3v/WWVX/v1mv9f1W/wbqHY

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      bbeec16cd85d4ca35153bcfd102c2e24c0099ee848c4587126601e99ff91ca95

    • Size

      65KB

    • MD5

      59bef13fe56a84c9c48ca64933d6ed79

    • SHA1

      d68beecee90424443bb229952fc4e2d4a47ede5a

    • SHA256

      bbeec16cd85d4ca35153bcfd102c2e24c0099ee848c4587126601e99ff91ca95

    • SHA512

      30da60a27e1bf8c59e5ba06e6bc4a568bd25b67a938693fb2817a8da98dff27da3d7ddda7fee30adb701562b22f1ff233673951f66e5bcc305071e93f01d7cbd

    • SSDEEP

      1536:R+pp2+oI71Mlh5c3v/WWVWK/me1mfX9f1f+CcwQoqHwf:EppDylh5c3v/WWVX/v1mv9f1W/wbqHY

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks