General

  • Target

    2bae3b6c7ccb527e97e722b3288b60320d836c8e6de8ca1ec757ed0602f1322f

  • Size

    327KB

  • Sample

    240610-y355esyepg

  • MD5

    6d6836a9d6b5f361024c3b8a69bd47bf

  • SHA1

    f940bbf01e03c3dca256cd36b2f5dabc601bd3c4

  • SHA256

    2bae3b6c7ccb527e97e722b3288b60320d836c8e6de8ca1ec757ed0602f1322f

  • SHA512

    ebff2244be4f1eada9ce81a91175807a15663fe53266af77528dc5780e249e923ddfbfbef02259e5a191f60a2ab3f491c3223c65962f9a5774880d36deaed00a

  • SSDEEP

    6144:XsLqdufVUNDa3S5llllllllllllllllllllllllllllllllllllllllllllllllx:cFUNDa3S5llllllllllllllllllllllh

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2bae3b6c7ccb527e97e722b3288b60320d836c8e6de8ca1ec757ed0602f1322f

    • Size

      327KB

    • MD5

      6d6836a9d6b5f361024c3b8a69bd47bf

    • SHA1

      f940bbf01e03c3dca256cd36b2f5dabc601bd3c4

    • SHA256

      2bae3b6c7ccb527e97e722b3288b60320d836c8e6de8ca1ec757ed0602f1322f

    • SHA512

      ebff2244be4f1eada9ce81a91175807a15663fe53266af77528dc5780e249e923ddfbfbef02259e5a191f60a2ab3f491c3223c65962f9a5774880d36deaed00a

    • SSDEEP

      6144:XsLqdufVUNDa3S5llllllllllllllllllllllllllllllllllllllllllllllllx:cFUNDa3S5llllllllllllllllllllllh

    • Modifies firewall policy service

    • Modifies visiblity of hidden/system files in Explorer

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks