General

  • Target

    bea798e593975ed9c350ca72fb627a2b9140f14a56eb89a66c3ea87e3ec3b718

  • Size

    283KB

  • Sample

    241120-dqgk3strdr

  • MD5

    5df10a3a498790ca9238077ccf55de1e

  • SHA1

    68f6e5aae0823ce4a82f5f0684a5a24f4d9b3581

  • SHA256

    bea798e593975ed9c350ca72fb627a2b9140f14a56eb89a66c3ea87e3ec3b718

  • SHA512

    f2234102502884dc8108485d78a84398b9d7e3ee14674752e21bee7ee70911292e6c712273d3db146fe1d16fd5b0ea5b74172485d3511ae620c6881d861dd8aa

  • SSDEEP

    3072:wNyXpaJC/jdelKE90KmIJQ3FKrKOYHhph3Z0ojWPTKGloGjHlJ7gB968Z7/CZTHJ:myXp99z4T14KuS2MWSBFEqQDujo78

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      bea798e593975ed9c350ca72fb627a2b9140f14a56eb89a66c3ea87e3ec3b718

    • Size

      283KB

    • MD5

      5df10a3a498790ca9238077ccf55de1e

    • SHA1

      68f6e5aae0823ce4a82f5f0684a5a24f4d9b3581

    • SHA256

      bea798e593975ed9c350ca72fb627a2b9140f14a56eb89a66c3ea87e3ec3b718

    • SHA512

      f2234102502884dc8108485d78a84398b9d7e3ee14674752e21bee7ee70911292e6c712273d3db146fe1d16fd5b0ea5b74172485d3511ae620c6881d861dd8aa

    • SSDEEP

      3072:wNyXpaJC/jdelKE90KmIJQ3FKrKOYHhph3Z0ojWPTKGloGjHlJ7gB968Z7/CZTHJ:myXp99z4T14KuS2MWSBFEqQDujo78

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks