General

  • Target

    cf9c04eb4556992ace711af7da9553bf6e859eed4ddfd032aa8475ff6bcb2bff

  • Size

    120KB

  • Sample

    241206-db2mpssmep

  • MD5

    528842b156823b32a51894e269e64bd6

  • SHA1

    81a288e8ea393e0619d288e8210762e0302cd9af

  • SHA256

    cf9c04eb4556992ace711af7da9553bf6e859eed4ddfd032aa8475ff6bcb2bff

  • SHA512

    afd5edde799823bd2c8526ad476ec3d5751435c5a0011cd0b62ed96cfc2b8afa9d890e32f2f6f882e5822ae6f68cfb40537cdb40c70dd7347844239c16f38167

  • SSDEEP

    3072:AMba94U9rb2iI2RA7UfGo7oK70uPU66IYI:AMi4UlrIIb7ocMrIY

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      cf9c04eb4556992ace711af7da9553bf6e859eed4ddfd032aa8475ff6bcb2bff

    • Size

      120KB

    • MD5

      528842b156823b32a51894e269e64bd6

    • SHA1

      81a288e8ea393e0619d288e8210762e0302cd9af

    • SHA256

      cf9c04eb4556992ace711af7da9553bf6e859eed4ddfd032aa8475ff6bcb2bff

    • SHA512

      afd5edde799823bd2c8526ad476ec3d5751435c5a0011cd0b62ed96cfc2b8afa9d890e32f2f6f882e5822ae6f68cfb40537cdb40c70dd7347844239c16f38167

    • SSDEEP

      3072:AMba94U9rb2iI2RA7UfGo7oK70uPU66IYI:AMi4UlrIIb7ocMrIY

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks