General

  • Target

    488725393b85cd4934330890b6dac7ac1811ddf5b451e8db0b358c1fd7b57de7

  • Size

    910KB

  • Sample

    241203-y38kjssldv

  • MD5

    55535ed1e5ee2ff8d519fb477335d9cf

  • SHA1

    bb483e62141db6e690be013395845a251d7e843d

  • SHA256

    488725393b85cd4934330890b6dac7ac1811ddf5b451e8db0b358c1fd7b57de7

  • SHA512

    78f79fc0eaad0c5887de671eb80da5016c18a3a3a58688a1ea03f6aa9848da50b524ffc25ef6aa3f8a70257b697b7f01b19da9c9de737cc2cbe129554bfdc146

  • SSDEEP

    24576:pJ+xweXAUEKkP7wKtAlZlb0fMMMMMMMMMMMMM1MMMCMMMMiIApMcMMi/MMTrLYgY:RvP7eZlb0fMMMMMMMMMMMMM1MMMCMMMl

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      488725393b85cd4934330890b6dac7ac1811ddf5b451e8db0b358c1fd7b57de7

    • Size

      910KB

    • MD5

      55535ed1e5ee2ff8d519fb477335d9cf

    • SHA1

      bb483e62141db6e690be013395845a251d7e843d

    • SHA256

      488725393b85cd4934330890b6dac7ac1811ddf5b451e8db0b358c1fd7b57de7

    • SHA512

      78f79fc0eaad0c5887de671eb80da5016c18a3a3a58688a1ea03f6aa9848da50b524ffc25ef6aa3f8a70257b697b7f01b19da9c9de737cc2cbe129554bfdc146

    • SSDEEP

      24576:pJ+xweXAUEKkP7wKtAlZlb0fMMMMMMMMMMMMM1MMMCMMMMiIApMcMMi/MMTrLYgY:RvP7eZlb0fMMMMMMMMMMMMM1MMMCMMMl

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks