General

  • Target

    2024-05-30_5e9a19a7a32449effd4645cefc7849f0_floxif_mafia

  • Size

    1.1MB

  • Sample

    240530-mf12eafb33

  • MD5

    5e9a19a7a32449effd4645cefc7849f0

  • SHA1

    622f81f1b2fdfbe2f896031fb9d77257a51c4d05

  • SHA256

    799fde856ab37a7b5cdc33ef56f72d6c7b4bf3b550725ad75254b3809dfe5667

  • SHA512

    8b27c114a2b4e9dd8367a3cef960cc193343a9beeda6116317c7f84a92e83f40be8413c95382b746bc2c53e28993e4ed4dd1f41908f3dd9285b9588bf7dc3ac0

  • SSDEEP

    24576:KnZKK3PTsn/yjYbErrHkx9A99JqHyCYrEH7yN:QAOrsqjYbErLkxejJCqN

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2024-05-30_5e9a19a7a32449effd4645cefc7849f0_floxif_mafia

    • Size

      1.1MB

    • MD5

      5e9a19a7a32449effd4645cefc7849f0

    • SHA1

      622f81f1b2fdfbe2f896031fb9d77257a51c4d05

    • SHA256

      799fde856ab37a7b5cdc33ef56f72d6c7b4bf3b550725ad75254b3809dfe5667

    • SHA512

      8b27c114a2b4e9dd8367a3cef960cc193343a9beeda6116317c7f84a92e83f40be8413c95382b746bc2c53e28993e4ed4dd1f41908f3dd9285b9588bf7dc3ac0

    • SSDEEP

      24576:KnZKK3PTsn/yjYbErrHkx9A99JqHyCYrEH7yN:QAOrsqjYbErLkxejJCqN

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks