General

  • Target

    c580f351a120b47b4a2e330630da92032b7f31ba76286001c28cb7b66fde19f3

  • Size

    120KB

  • Sample

    241122-elb1gatphw

  • MD5

    15d13d6d14f297b5daa76ee9cdfd1e86

  • SHA1

    b6f5f2ccddbacda179aed1e268371b741744f5ff

  • SHA256

    c580f351a120b47b4a2e330630da92032b7f31ba76286001c28cb7b66fde19f3

  • SHA512

    752a33e1d20198500fd1b27e41f8c88e9a8290f23f9135dd256bdb318e024e6a4de491f8b93b59c27fff87b48871d90a3d9a896680574af00d3f641dfa776a66

  • SSDEEP

    3072:icfewIt9GGvTWU1Ir3EsFMNZyMbIxHruJ8:iU3I3fL/IzEtZNsxu

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c580f351a120b47b4a2e330630da92032b7f31ba76286001c28cb7b66fde19f3

    • Size

      120KB

    • MD5

      15d13d6d14f297b5daa76ee9cdfd1e86

    • SHA1

      b6f5f2ccddbacda179aed1e268371b741744f5ff

    • SHA256

      c580f351a120b47b4a2e330630da92032b7f31ba76286001c28cb7b66fde19f3

    • SHA512

      752a33e1d20198500fd1b27e41f8c88e9a8290f23f9135dd256bdb318e024e6a4de491f8b93b59c27fff87b48871d90a3d9a896680574af00d3f641dfa776a66

    • SSDEEP

      3072:icfewIt9GGvTWU1Ir3EsFMNZyMbIxHruJ8:iU3I3fL/IzEtZNsxu

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks