General

  • Target

    317590c2576ef4c7b8ad058c5af9c3b4a07537915c4c9cc1c744d78eee022198

  • Size

    65KB

  • Sample

    240529-yyjqmahb99

  • MD5

    4359c053fba5ffeb57f2bb7eff929bbe

  • SHA1

    988a9c3b3633d32ca7b67647c3b3fcd25df7e7d7

  • SHA256

    317590c2576ef4c7b8ad058c5af9c3b4a07537915c4c9cc1c744d78eee022198

  • SHA512

    d3b542f829a880e412a5f83ec8cdc5fafdfc0598d9227199780999fa89b316766737a10bef6310cf6e21b996622d91cb2fd8be1bb575c7960a8f95008637ea5f

  • SSDEEP

    1536:0zRaGTGAWW/IFn8iZPENXyrjbyBPlmdNLYIu4BUImoS:MR2y/IFn8nXWyrmdN/BIn

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      317590c2576ef4c7b8ad058c5af9c3b4a07537915c4c9cc1c744d78eee022198

    • Size

      65KB

    • MD5

      4359c053fba5ffeb57f2bb7eff929bbe

    • SHA1

      988a9c3b3633d32ca7b67647c3b3fcd25df7e7d7

    • SHA256

      317590c2576ef4c7b8ad058c5af9c3b4a07537915c4c9cc1c744d78eee022198

    • SHA512

      d3b542f829a880e412a5f83ec8cdc5fafdfc0598d9227199780999fa89b316766737a10bef6310cf6e21b996622d91cb2fd8be1bb575c7960a8f95008637ea5f

    • SSDEEP

      1536:0zRaGTGAWW/IFn8iZPENXyrjbyBPlmdNLYIu4BUImoS:MR2y/IFn8nXWyrmdN/BIn

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks