General

  • Target

    a6c90d089c3fa94f286d6a914f598d3c5de45807347273f570504356035d3138

  • Size

    120KB

  • Sample

    241206-bdh72axnhk

  • MD5

    c0ac085b8782ecc696334593d4f6db1e

  • SHA1

    2e1cc3da04c2a9457debde747f2904e33ae06296

  • SHA256

    a6c90d089c3fa94f286d6a914f598d3c5de45807347273f570504356035d3138

  • SHA512

    b82cf1d11082c30065a6319436160853dfab3899edefd218a3db1840cfe03753950df28eec2c9f69537674a75c4c2f6dac8b81b11374ed813a43f1825f5c4141

  • SSDEEP

    1536:jgM6E5Jlse9DegauGH5YM8RC/sZGGUkCRFho1mCxeheSxxOLHQOHvXd4QKg:cMzl3eH38RC/sZef1AewOxOLH9

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a6c90d089c3fa94f286d6a914f598d3c5de45807347273f570504356035d3138

    • Size

      120KB

    • MD5

      c0ac085b8782ecc696334593d4f6db1e

    • SHA1

      2e1cc3da04c2a9457debde747f2904e33ae06296

    • SHA256

      a6c90d089c3fa94f286d6a914f598d3c5de45807347273f570504356035d3138

    • SHA512

      b82cf1d11082c30065a6319436160853dfab3899edefd218a3db1840cfe03753950df28eec2c9f69537674a75c4c2f6dac8b81b11374ed813a43f1825f5c4141

    • SSDEEP

      1536:jgM6E5Jlse9DegauGH5YM8RC/sZGGUkCRFho1mCxeheSxxOLHQOHvXd4QKg:cMzl3eH38RC/sZef1AewOxOLH9

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks