General

  • Target

    3b8361dd925e0c6bc8867e1a8868db55246e0eabd13f38fafe4f191e306a7766

  • Size

    120KB

  • Sample

    241205-z6xg5asmg1

  • MD5

    3de370dc544d3e6a21acc485b6254c47

  • SHA1

    ba893dda3fb8c61655c5f823e5839d969e8789ac

  • SHA256

    3b8361dd925e0c6bc8867e1a8868db55246e0eabd13f38fafe4f191e306a7766

  • SHA512

    28ae67e1e27cc6457b97fe115fd0929120a15745f161866c9e3d615affb5a1d9847bb1f666e20ec2d297d6d8e74127d0de10b0fca0a0ea6effd63a9e092fac3c

  • SSDEEP

    1536:DQAnrU2BpOfVHZyFX2lOXpuQgOsrD6onV+YI2q2lVkaLwg1BhG/CcX9:HrNpWBZMXMOQ3lrlVvHzketFPm9

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      3b8361dd925e0c6bc8867e1a8868db55246e0eabd13f38fafe4f191e306a7766

    • Size

      120KB

    • MD5

      3de370dc544d3e6a21acc485b6254c47

    • SHA1

      ba893dda3fb8c61655c5f823e5839d969e8789ac

    • SHA256

      3b8361dd925e0c6bc8867e1a8868db55246e0eabd13f38fafe4f191e306a7766

    • SHA512

      28ae67e1e27cc6457b97fe115fd0929120a15745f161866c9e3d615affb5a1d9847bb1f666e20ec2d297d6d8e74127d0de10b0fca0a0ea6effd63a9e092fac3c

    • SSDEEP

      1536:DQAnrU2BpOfVHZyFX2lOXpuQgOsrD6onV+YI2q2lVkaLwg1BhG/CcX9:HrNpWBZMXMOQ3lrlVvHzketFPm9

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks