General

  • Target

    3b903766bc02ec60a172396e8f77ba5cad28b1a5f853b70dbe050e2e0c948d90

  • Size

    120KB

  • Sample

    241206-1dzmfsvlhr

  • MD5

    473f4421e217f21a478473a1d2ceebdf

  • SHA1

    5efa86756a7a6997bd65eb64a30851327184c025

  • SHA256

    3b903766bc02ec60a172396e8f77ba5cad28b1a5f853b70dbe050e2e0c948d90

  • SHA512

    5ba3ec1fbd00c42ca62ad2859cf13727cea4c9897d3ff14a05c0722bd645ddace3fcd65918a7bcf042ee134c3fc4b3bfc3b7234d56543ec48385cdb594beefd5

  • SSDEEP

    1536:1PzMyQJFzzmBxh2m9qYQ39AVjOZUoIIlOFrbDsnCPSqOJvIoz4PWpQBkbXb:17828/YsAVqUoWEn1qOJAYHQBS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      3b903766bc02ec60a172396e8f77ba5cad28b1a5f853b70dbe050e2e0c948d90

    • Size

      120KB

    • MD5

      473f4421e217f21a478473a1d2ceebdf

    • SHA1

      5efa86756a7a6997bd65eb64a30851327184c025

    • SHA256

      3b903766bc02ec60a172396e8f77ba5cad28b1a5f853b70dbe050e2e0c948d90

    • SHA512

      5ba3ec1fbd00c42ca62ad2859cf13727cea4c9897d3ff14a05c0722bd645ddace3fcd65918a7bcf042ee134c3fc4b3bfc3b7234d56543ec48385cdb594beefd5

    • SSDEEP

      1536:1PzMyQJFzzmBxh2m9qYQ39AVjOZUoIIlOFrbDsnCPSqOJvIoz4PWpQBkbXb:17828/YsAVqUoWEn1qOJAYHQBS

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks