General

  • Target

    a24eabeee4ee9701719ac05b82bfa3feb1429c2fb03c340ddff7403acfbf98afN

  • Size

    120KB

  • Sample

    240919-nlsgwswgnq

  • MD5

    3fd4f58020aa97f3c9009258f52b6e80

  • SHA1

    9c243e7ab8b17d3b2d6fef7e7b861ab377c8762c

  • SHA256

    a24eabeee4ee9701719ac05b82bfa3feb1429c2fb03c340ddff7403acfbf98af

  • SHA512

    5488a33c15f47b1fc8693ceed761a42e08d3a02c4276339e4bd71d040a50993ba104a45f3f60d0d8102773dd55cc68e4f7e0143e4b06de54b4ac6dfdbfbfb5c9

  • SSDEEP

    3072:ssgnmjbma8Q+QjziwdIlL2v5L1kceNLD:sswmjrbziwSo5Bkcu3

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a24eabeee4ee9701719ac05b82bfa3feb1429c2fb03c340ddff7403acfbf98afN

    • Size

      120KB

    • MD5

      3fd4f58020aa97f3c9009258f52b6e80

    • SHA1

      9c243e7ab8b17d3b2d6fef7e7b861ab377c8762c

    • SHA256

      a24eabeee4ee9701719ac05b82bfa3feb1429c2fb03c340ddff7403acfbf98af

    • SHA512

      5488a33c15f47b1fc8693ceed761a42e08d3a02c4276339e4bd71d040a50993ba104a45f3f60d0d8102773dd55cc68e4f7e0143e4b06de54b4ac6dfdbfbfb5c9

    • SSDEEP

      3072:ssgnmjbma8Q+QjziwdIlL2v5L1kceNLD:sswmjrbziwSo5Bkcu3

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks