General

  • Target

    1d113c299e567306f88c97a5f580bcdb7ce4d4487644899a654f3ab3cc8348e5

  • Size

    65KB

  • Sample

    240611-x1gtdayanc

  • MD5

    6b6f882f051188c943eaf5e92c277545

  • SHA1

    575e69dd28fa02e906dceae1278629dac71f2637

  • SHA256

    1d113c299e567306f88c97a5f580bcdb7ce4d4487644899a654f3ab3cc8348e5

  • SHA512

    7219f0c6c285c95522491733150c022512cd97bb9e0f45fa0bc321bc8ff42f3d91f5a0e90874c670b43a1dde85e23829fb6f1095d69f2cd689d3a37b98b390cc

  • SSDEEP

    1536:EdY8U2PDQq0wrQFk8jNdMASYm0yhkaL98G4j+ijv:j2PO28dFwWyir

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1d113c299e567306f88c97a5f580bcdb7ce4d4487644899a654f3ab3cc8348e5

    • Size

      65KB

    • MD5

      6b6f882f051188c943eaf5e92c277545

    • SHA1

      575e69dd28fa02e906dceae1278629dac71f2637

    • SHA256

      1d113c299e567306f88c97a5f580bcdb7ce4d4487644899a654f3ab3cc8348e5

    • SHA512

      7219f0c6c285c95522491733150c022512cd97bb9e0f45fa0bc321bc8ff42f3d91f5a0e90874c670b43a1dde85e23829fb6f1095d69f2cd689d3a37b98b390cc

    • SSDEEP

      1536:EdY8U2PDQq0wrQFk8jNdMASYm0yhkaL98G4j+ijv:j2PO28dFwWyir

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Modify Registry

5
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks