General

  • Target

    15982724fadde536c8e019330f061ec3d5ffa6f63555c1fd40677bd68f96fcdb

  • Size

    156KB

  • Sample

    241206-h45x2ssjel

  • MD5

    c4ab616834b5afbb985d2ec4f5195e16

  • SHA1

    0fa3fe1beec3dad05dd5fbd8419a76c59ef6aaa3

  • SHA256

    15982724fadde536c8e019330f061ec3d5ffa6f63555c1fd40677bd68f96fcdb

  • SHA512

    288cb0aa751b1e2ce4795e60548e497aeaee8a09876ee407df7a0cb8655364075776d09cdc87af769c347fc9b8fe75e115ea6d89ee6f8935bffc97d9df272fec

  • SSDEEP

    3072:iYyEpMnRPTLmEpMLRPTL3EpMoRPTL8EpMFRPTLVEpMGRPTL5j9EX/imvMC9EXMiG:i8nXH+TePo8k9qUJdXAIeNQjVd7m

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      15982724fadde536c8e019330f061ec3d5ffa6f63555c1fd40677bd68f96fcdb

    • Size

      156KB

    • MD5

      c4ab616834b5afbb985d2ec4f5195e16

    • SHA1

      0fa3fe1beec3dad05dd5fbd8419a76c59ef6aaa3

    • SHA256

      15982724fadde536c8e019330f061ec3d5ffa6f63555c1fd40677bd68f96fcdb

    • SHA512

      288cb0aa751b1e2ce4795e60548e497aeaee8a09876ee407df7a0cb8655364075776d09cdc87af769c347fc9b8fe75e115ea6d89ee6f8935bffc97d9df272fec

    • SSDEEP

      3072:iYyEpMnRPTLmEpMLRPTL3EpMoRPTL8EpMFRPTLVEpMGRPTL5j9EX/imvMC9EXMiG:i8nXH+TePo8k9qUJdXAIeNQjVd7m

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks