General

  • Target

    c253d9ecab80162ac3e63f48ee327d15acf8f904ba421cec283155c1756eceab

  • Size

    120KB

  • Sample

    241120-dx89nszbjb

  • MD5

    d2317622a66a297eecc5cc8f0b45952a

  • SHA1

    93e7f7988619500be5ca9a9c7cc06d124e0df36e

  • SHA256

    c253d9ecab80162ac3e63f48ee327d15acf8f904ba421cec283155c1756eceab

  • SHA512

    270acefb1a6a300c57e1461e0cd55171eeb9ca6040bf580c8a6bef3a70de17274a11ee49cdc10ee57d54c782c9cc0938f197e10bea0322f9c9c7e81c051178c0

  • SSDEEP

    3072:9ZhYg1nTTgv0Vi5QESGZZJ0G47fOFeUArcpV5:9r60oTSs0R7f25AS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c253d9ecab80162ac3e63f48ee327d15acf8f904ba421cec283155c1756eceab

    • Size

      120KB

    • MD5

      d2317622a66a297eecc5cc8f0b45952a

    • SHA1

      93e7f7988619500be5ca9a9c7cc06d124e0df36e

    • SHA256

      c253d9ecab80162ac3e63f48ee327d15acf8f904ba421cec283155c1756eceab

    • SHA512

      270acefb1a6a300c57e1461e0cd55171eeb9ca6040bf580c8a6bef3a70de17274a11ee49cdc10ee57d54c782c9cc0938f197e10bea0322f9c9c7e81c051178c0

    • SSDEEP

      3072:9ZhYg1nTTgv0Vi5QESGZZJ0G47fOFeUArcpV5:9r60oTSs0R7f25AS

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks