General

  • Target

    87f985b0db6a8becb13012ea37364036a5653c42728b128b30428cd42e877ef8N

  • Size

    120KB

  • Sample

    241013-pybkks1hmr

  • MD5

    41a182ed050708955d26a3e2757b79b0

  • SHA1

    05832a671494116cbe3edbe8f9ca2c84404a08b3

  • SHA256

    87f985b0db6a8becb13012ea37364036a5653c42728b128b30428cd42e877ef8

  • SHA512

    77d4d31587355006e95c1a8629d1199ed2baea5388ae90150c5a7a9cec54789fc92d07a1f55b5210e3d7636425151b6ea0c006de5936fc6b3447b92f3ae14aa7

  • SSDEEP

    1536:Vgs/RGyVtrwQ9dDacVpw1yop2EzGpLC/eYM8zHLaRzbfoMDONLWCuwt:VgsswNDhV/op2E+LaeYMMuhcoONLWst

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      87f985b0db6a8becb13012ea37364036a5653c42728b128b30428cd42e877ef8N

    • Size

      120KB

    • MD5

      41a182ed050708955d26a3e2757b79b0

    • SHA1

      05832a671494116cbe3edbe8f9ca2c84404a08b3

    • SHA256

      87f985b0db6a8becb13012ea37364036a5653c42728b128b30428cd42e877ef8

    • SHA512

      77d4d31587355006e95c1a8629d1199ed2baea5388ae90150c5a7a9cec54789fc92d07a1f55b5210e3d7636425151b6ea0c006de5936fc6b3447b92f3ae14aa7

    • SSDEEP

      1536:Vgs/RGyVtrwQ9dDacVpw1yop2EzGpLC/eYM8zHLaRzbfoMDONLWCuwt:VgsswNDhV/op2E+LaeYMMuhcoONLWst

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks