General

  • Target

    e1edc778479efeb94b2f40f5bf51cec4c0f864a20dd4d503eaf531b4802a397a

  • Size

    1.8MB

  • Sample

    241206-d1hk5ayjgx

  • MD5

    807d68ebdb37828fd0ad2d56c19e7137

  • SHA1

    374f5733cd546fb8e88b41633758dd4c9ef0bf71

  • SHA256

    e1edc778479efeb94b2f40f5bf51cec4c0f864a20dd4d503eaf531b4802a397a

  • SHA512

    72ae4df233dd3f10380bf299343c52a6fb440ce48173c3ee11addc3a32935fc82fdaaa4b0b10c1f86436e9a88af836cd3b0447e6f130c0acdb59e40527d0dacd

  • SSDEEP

    49152:aFxErb1F2gqQF6d8RrycC51DtuoIwgpXIfWzbnoP2qDA3rx:iGb1FLqQF6dWry//DthQiooP2qDA7x

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e1edc778479efeb94b2f40f5bf51cec4c0f864a20dd4d503eaf531b4802a397a

    • Size

      1.8MB

    • MD5

      807d68ebdb37828fd0ad2d56c19e7137

    • SHA1

      374f5733cd546fb8e88b41633758dd4c9ef0bf71

    • SHA256

      e1edc778479efeb94b2f40f5bf51cec4c0f864a20dd4d503eaf531b4802a397a

    • SHA512

      72ae4df233dd3f10380bf299343c52a6fb440ce48173c3ee11addc3a32935fc82fdaaa4b0b10c1f86436e9a88af836cd3b0447e6f130c0acdb59e40527d0dacd

    • SSDEEP

      49152:aFxErb1F2gqQF6d8RrycC51DtuoIwgpXIfWzbnoP2qDA3rx:iGb1FLqQF6dWry//DthQiooP2qDA7x

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks