General

  • Target

    123000bdc026d42c1c56a9947f2ae80a66c295cc00a1b3370efe81c662e9df97

  • Size

    1.2MB

  • Sample

    241203-yzxzmssjgt

  • MD5

    6e74e262ffe24121865fd9a749e1b58e

  • SHA1

    96620fdcd12fdad209e9784e6ae4c316468318a4

  • SHA256

    123000bdc026d42c1c56a9947f2ae80a66c295cc00a1b3370efe81c662e9df97

  • SHA512

    669c7e9f30ca71aff9ca9b9e0225c6512d3c16a7135fb2a30326099cfc77ff4355c96271f07eea9dbfcfb033d8b05fcbb1b6cea7b026db294fc90d9f3e101081

  • SSDEEP

    24576:AvcalRcz9F16LOR0wo5hStmay9wqQR0pt9mous0X/TPzQNbmO8yWqPpZTMov87:Akabcz9FCQx5X4wHbP4a3Sg

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      123000bdc026d42c1c56a9947f2ae80a66c295cc00a1b3370efe81c662e9df97

    • Size

      1.2MB

    • MD5

      6e74e262ffe24121865fd9a749e1b58e

    • SHA1

      96620fdcd12fdad209e9784e6ae4c316468318a4

    • SHA256

      123000bdc026d42c1c56a9947f2ae80a66c295cc00a1b3370efe81c662e9df97

    • SHA512

      669c7e9f30ca71aff9ca9b9e0225c6512d3c16a7135fb2a30326099cfc77ff4355c96271f07eea9dbfcfb033d8b05fcbb1b6cea7b026db294fc90d9f3e101081

    • SSDEEP

      24576:AvcalRcz9F16LOR0wo5hStmay9wqQR0pt9mous0X/TPzQNbmO8yWqPpZTMov87:Akabcz9FCQx5X4wHbP4a3Sg

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks