General

  • Target

    b8dceb743f0792767b782e83d503a1e48d52088fb7027485db8ca388668410b3

  • Size

    120KB

  • Sample

    241122-d3tq6stndv

  • MD5

    17a7f90783d0daf14c13ae60fb8eb4d2

  • SHA1

    eeb23fb2ce8244a9776a75fea36d9443dfd920ad

  • SHA256

    b8dceb743f0792767b782e83d503a1e48d52088fb7027485db8ca388668410b3

  • SHA512

    c775bad72a865036e1b7651c840e9ec06f0365afddff3ada3690b515c4216e089189c51b9133634b911dc447050dae5945078a2c4a58b82439924a4e2cda4aa8

  • SSDEEP

    3072:Tba6Zh1HAvGM38/GRgRRxqmNjqWiRryUq:3vZUeM3NabNDiRe

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      b8dceb743f0792767b782e83d503a1e48d52088fb7027485db8ca388668410b3

    • Size

      120KB

    • MD5

      17a7f90783d0daf14c13ae60fb8eb4d2

    • SHA1

      eeb23fb2ce8244a9776a75fea36d9443dfd920ad

    • SHA256

      b8dceb743f0792767b782e83d503a1e48d52088fb7027485db8ca388668410b3

    • SHA512

      c775bad72a865036e1b7651c840e9ec06f0365afddff3ada3690b515c4216e089189c51b9133634b911dc447050dae5945078a2c4a58b82439924a4e2cda4aa8

    • SSDEEP

      3072:Tba6Zh1HAvGM38/GRgRRxqmNjqWiRryUq:3vZUeM3NabNDiRe

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks