General

  • Target

    995a699798a8ec5e8d005826b34cf87d1746c8ecd1bf0d59b01ca6a9d25a5590

  • Size

    120KB

  • Sample

    240529-amt58abe26

  • MD5

    dd470f7499da1c4fafc591e40c762598

  • SHA1

    b1d3ab6732de08d4dca4e0167e066ac449049545

  • SHA256

    995a699798a8ec5e8d005826b34cf87d1746c8ecd1bf0d59b01ca6a9d25a5590

  • SHA512

    68c4ae7e5b03cf75664659a093c0668751acd1b55c0ef74355bf2cd9bd5a7e0a6aaeb16c64bdd97b68794a9c898d738c870d5ca41cde119baeaa22c37dd3f8a0

  • SSDEEP

    1536:Xa6vbzxVztOQpTodgGdzynnPYF09xL9sZYB1tTClZn2WQP9POhXy+:Xakf5pGdzIrHYOTmZ/2WD

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      995a699798a8ec5e8d005826b34cf87d1746c8ecd1bf0d59b01ca6a9d25a5590

    • Size

      120KB

    • MD5

      dd470f7499da1c4fafc591e40c762598

    • SHA1

      b1d3ab6732de08d4dca4e0167e066ac449049545

    • SHA256

      995a699798a8ec5e8d005826b34cf87d1746c8ecd1bf0d59b01ca6a9d25a5590

    • SHA512

      68c4ae7e5b03cf75664659a093c0668751acd1b55c0ef74355bf2cd9bd5a7e0a6aaeb16c64bdd97b68794a9c898d738c870d5ca41cde119baeaa22c37dd3f8a0

    • SSDEEP

      1536:Xa6vbzxVztOQpTodgGdzynnPYF09xL9sZYB1tTClZn2WQP9POhXy+:Xakf5pGdzIrHYOTmZ/2WD

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks