General

  • Target

    4760416255a42110681fbe43421f5d2817eea6469caad53e2fc3bfa0576ee295

  • Size

    65KB

  • Sample

    240613-175qkawenj

  • MD5

    011623b8cc16dbf1cd4efaef761441a3

  • SHA1

    924c965712c1d58820706ab34740b774e2cc50e1

  • SHA256

    4760416255a42110681fbe43421f5d2817eea6469caad53e2fc3bfa0576ee295

  • SHA512

    03940d58cb029bbfe96c20df6db109767afdff77bcd5ba2f8077f7bd15628718524e7a112634c5aa2c7a16557796283a0768d9349fd56b3db885033b8a493c62

  • SSDEEP

    1536:Cy602lLwoE0WwUKZZekEj2r/6qdrhecc1A05i7ernKXbJ:A/lR/W/KZwxCJ9spO7+wbJ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4760416255a42110681fbe43421f5d2817eea6469caad53e2fc3bfa0576ee295

    • Size

      65KB

    • MD5

      011623b8cc16dbf1cd4efaef761441a3

    • SHA1

      924c965712c1d58820706ab34740b774e2cc50e1

    • SHA256

      4760416255a42110681fbe43421f5d2817eea6469caad53e2fc3bfa0576ee295

    • SHA512

      03940d58cb029bbfe96c20df6db109767afdff77bcd5ba2f8077f7bd15628718524e7a112634c5aa2c7a16557796283a0768d9349fd56b3db885033b8a493c62

    • SSDEEP

      1536:Cy602lLwoE0WwUKZZekEj2r/6qdrhecc1A05i7ernKXbJ:A/lR/W/KZwxCJ9spO7+wbJ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks