General

  • Target

    e2de8fed7c18f65ebf73184dc8ae68a06ac2f5e92e1515c7772643d395d1dad3N

  • Size

    120KB

  • Sample

    241009-l9tzhssgkf

  • MD5

    009b2316f55d13ade175629f71dd8ca0

  • SHA1

    bd6d35cff53b9827e7f44f231124fde8d439e595

  • SHA256

    e2de8fed7c18f65ebf73184dc8ae68a06ac2f5e92e1515c7772643d395d1dad3

  • SHA512

    e6aee93ef08db178c64932b70dad0904317eab017925cca22414009ee04756c4fb964648d1073a0bf89ed31dbb58a31db535fb7caa81def371c2f00c09ae6da7

  • SSDEEP

    3072:Y8X8xiOROJw1s/rnd0kpww22fzpuLGn/ppBkJbITY:Y8zOcC1Mja6fzELs7BkJbI

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e2de8fed7c18f65ebf73184dc8ae68a06ac2f5e92e1515c7772643d395d1dad3N

    • Size

      120KB

    • MD5

      009b2316f55d13ade175629f71dd8ca0

    • SHA1

      bd6d35cff53b9827e7f44f231124fde8d439e595

    • SHA256

      e2de8fed7c18f65ebf73184dc8ae68a06ac2f5e92e1515c7772643d395d1dad3

    • SHA512

      e6aee93ef08db178c64932b70dad0904317eab017925cca22414009ee04756c4fb964648d1073a0bf89ed31dbb58a31db535fb7caa81def371c2f00c09ae6da7

    • SSDEEP

      3072:Y8X8xiOROJw1s/rnd0kpww22fzpuLGn/ppBkJbITY:Y8zOcC1Mja6fzELs7BkJbI

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks