General

  • Target

    7182340dd2d30c88ed5d67ceeba76efbee6535e71e25ca7ac829559a2a2c900a

  • Size

    120KB

  • Sample

    241205-271x2stkhp

  • MD5

    424423345bbfc88d26b2e8b8b8835f03

  • SHA1

    638d7445dee5271246780d248676da0b76b04dd0

  • SHA256

    7182340dd2d30c88ed5d67ceeba76efbee6535e71e25ca7ac829559a2a2c900a

  • SHA512

    d615899a00ea9ce55f00fa214c7351a871503680e165aac1b0530da41744d8f871489b03e98e11afcdc93b2547b63912170d634c06046be2cb21d1cbec1ac8de

  • SSDEEP

    1536:pLSgwaoaC+osP30GknDCvThyS4ocqgOkIXNl0fwBY9ZvUTlTmFZaa62FoDVEYcQ2:b8a2sMGknDghySDi0NkLUTleZaatoc

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      7182340dd2d30c88ed5d67ceeba76efbee6535e71e25ca7ac829559a2a2c900a

    • Size

      120KB

    • MD5

      424423345bbfc88d26b2e8b8b8835f03

    • SHA1

      638d7445dee5271246780d248676da0b76b04dd0

    • SHA256

      7182340dd2d30c88ed5d67ceeba76efbee6535e71e25ca7ac829559a2a2c900a

    • SHA512

      d615899a00ea9ce55f00fa214c7351a871503680e165aac1b0530da41744d8f871489b03e98e11afcdc93b2547b63912170d634c06046be2cb21d1cbec1ac8de

    • SSDEEP

      1536:pLSgwaoaC+osP30GknDCvThyS4ocqgOkIXNl0fwBY9ZvUTlTmFZaa62FoDVEYcQ2:b8a2sMGknDghySDi0NkLUTleZaatoc

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks