General

  • Target

    d70c0229636d4e361a2587cb54dfd22ee5af500403e8936f687fa1649eb7e8b0

  • Size

    120KB

  • Sample

    240529-debkpage79

  • MD5

    35c67bbcebaec300b1eb57a63104f340

  • SHA1

    2dee3f96cdb8e17b5e55dff2533f0ca7bfdd02d4

  • SHA256

    d70c0229636d4e361a2587cb54dfd22ee5af500403e8936f687fa1649eb7e8b0

  • SHA512

    95c2898782ce826a23f26970ec66afe899e6da683d6f005c9bb3f170f3fc6dba34a495f1f174625fdc061e1ec99e9e92a79f66a16575c4467dba425f574dfc68

  • SSDEEP

    3072:tv0Fh5VxxtNxSq2H8VOHpgMmkb6EPeDTBEC0NG8:tQPb+DHQOHplXbtQT6T

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d70c0229636d4e361a2587cb54dfd22ee5af500403e8936f687fa1649eb7e8b0

    • Size

      120KB

    • MD5

      35c67bbcebaec300b1eb57a63104f340

    • SHA1

      2dee3f96cdb8e17b5e55dff2533f0ca7bfdd02d4

    • SHA256

      d70c0229636d4e361a2587cb54dfd22ee5af500403e8936f687fa1649eb7e8b0

    • SHA512

      95c2898782ce826a23f26970ec66afe899e6da683d6f005c9bb3f170f3fc6dba34a495f1f174625fdc061e1ec99e9e92a79f66a16575c4467dba425f574dfc68

    • SSDEEP

      3072:tv0Fh5VxxtNxSq2H8VOHpgMmkb6EPeDTBEC0NG8:tQPb+DHQOHplXbtQT6T

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks