General

  • Target

    e1b3dbdfe97e677bf787327451fdc07e9c119d8c0f17a521c85168390585e637

  • Size

    120KB

  • Sample

    241122-fnpvsavle1

  • MD5

    dab93dd63e4627f1ca110415eedee667

  • SHA1

    08c153d3c0c3a5a590ea77375cf78c8f268c3a4f

  • SHA256

    e1b3dbdfe97e677bf787327451fdc07e9c119d8c0f17a521c85168390585e637

  • SHA512

    974bbc7a0f222d256fb9dfbe1197552db8f40c75670264479cc8c250162cfe944844ab6dd65cdf2fbd3ed9f25c4a8d3b7b72ca998c2ea69c056ce06d86df1c8c

  • SSDEEP

    1536:2L+Gv8UulCFBZ9lrJp9l9/WdMrsZ5LMAeZjjN5CuZvefYdz22PltR9jO4bxVySVF:a7FZl9HIMK5LNe5jNU2T9N1Vzrvp

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e1b3dbdfe97e677bf787327451fdc07e9c119d8c0f17a521c85168390585e637

    • Size

      120KB

    • MD5

      dab93dd63e4627f1ca110415eedee667

    • SHA1

      08c153d3c0c3a5a590ea77375cf78c8f268c3a4f

    • SHA256

      e1b3dbdfe97e677bf787327451fdc07e9c119d8c0f17a521c85168390585e637

    • SHA512

      974bbc7a0f222d256fb9dfbe1197552db8f40c75670264479cc8c250162cfe944844ab6dd65cdf2fbd3ed9f25c4a8d3b7b72ca998c2ea69c056ce06d86df1c8c

    • SSDEEP

      1536:2L+Gv8UulCFBZ9lrJp9l9/WdMrsZ5LMAeZjjN5CuZvefYdz22PltR9jO4bxVySVF:a7FZl9HIMK5LNe5jNU2T9N1Vzrvp

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks