General

  • Target

    c20a928da031aba8f6b10f7cd62f86eb3f70e479cb37223dc8108eb5a24d7e56

  • Size

    120KB

  • Sample

    240614-d8bgsatflb

  • MD5

    1c9200bd3df601e374f8b51e2210155a

  • SHA1

    274996d657d66f4920827c7afb30e19217176303

  • SHA256

    c20a928da031aba8f6b10f7cd62f86eb3f70e479cb37223dc8108eb5a24d7e56

  • SHA512

    a74b54ed04d0981fe014af46de6fe9f24520fc54077a618fd6d1e638b7ee418e92c938c662d538ebc95d4b86baee97ff16f9d999ce1d9d6933213338bba1ce50

  • SSDEEP

    3072:Ctni6LzJJ/mxAoY5k1pMfDTdZqQVkZU5/E:CRTt2AoYi1pQ5ZqQ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c20a928da031aba8f6b10f7cd62f86eb3f70e479cb37223dc8108eb5a24d7e56

    • Size

      120KB

    • MD5

      1c9200bd3df601e374f8b51e2210155a

    • SHA1

      274996d657d66f4920827c7afb30e19217176303

    • SHA256

      c20a928da031aba8f6b10f7cd62f86eb3f70e479cb37223dc8108eb5a24d7e56

    • SHA512

      a74b54ed04d0981fe014af46de6fe9f24520fc54077a618fd6d1e638b7ee418e92c938c662d538ebc95d4b86baee97ff16f9d999ce1d9d6933213338bba1ce50

    • SSDEEP

      3072:Ctni6LzJJ/mxAoY5k1pMfDTdZqQVkZU5/E:CRTt2AoYi1pQ5ZqQ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks