General

  • Target

    89120cbb79384250b87f873331533368af9b7b3248bb25b3f4c9621318eaf291

  • Size

    9.8MB

  • Sample

    241205-g5k4laykgk

  • MD5

    4ef424374bc658488d6e85b9286ec189

  • SHA1

    31f86317920d033e6a2fc23c6995f896a6167105

  • SHA256

    89120cbb79384250b87f873331533368af9b7b3248bb25b3f4c9621318eaf291

  • SHA512

    9c4b20e760743d2f88bd8130cb2823e3faf7cdaea3ddfd68af8bcb27ec04fbd52d1db5117aa7a58212c114f27d5a6d5ed136c7e7e7fda555efa3c8e6dc9c2400

  • SSDEEP

    196608:zuOYT73A/PCDoWzN87yZqLcbUm4CzknrnbELh19M8pjx6gO0EMT/h:il7SqDhqyZqLwqqk3E39npjZO0Emp

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      89120cbb79384250b87f873331533368af9b7b3248bb25b3f4c9621318eaf291

    • Size

      9.8MB

    • MD5

      4ef424374bc658488d6e85b9286ec189

    • SHA1

      31f86317920d033e6a2fc23c6995f896a6167105

    • SHA256

      89120cbb79384250b87f873331533368af9b7b3248bb25b3f4c9621318eaf291

    • SHA512

      9c4b20e760743d2f88bd8130cb2823e3faf7cdaea3ddfd68af8bcb27ec04fbd52d1db5117aa7a58212c114f27d5a6d5ed136c7e7e7fda555efa3c8e6dc9c2400

    • SSDEEP

      196608:zuOYT73A/PCDoWzN87yZqLcbUm4CzknrnbELh19M8pjx6gO0EMT/h:il7SqDhqyZqLwqqk3E39npjZO0Emp

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks