General

  • Target

    2a8e8aa2739ab4c3a4c448b89eb8961fe76b85fc2b4fbec0ce9732198aa5ded6

  • Size

    156KB

  • Sample

    241206-nfswga1jgm

  • MD5

    8061856690cb606435fab350195a5aae

  • SHA1

    23a0b7c629b8d68207729e1a6eec6062ed4a80ba

  • SHA256

    2a8e8aa2739ab4c3a4c448b89eb8961fe76b85fc2b4fbec0ce9732198aa5ded6

  • SHA512

    5a16f535c2e28feadcb26ab43cf963abad6fe230a448d7120b7026cc05d2a6f763ed1caf80488c53deb16abc35c8e9df4969241b89315896cfefdea4b52acf34

  • SSDEEP

    3072:xYyEpMnRPTLmEpMLRPTL3EpMoRPTL8EpMFRPTLVEpMGRPTL5j9EX/imvMC9EXMiJ:x8nXH+82W65ouGK

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2a8e8aa2739ab4c3a4c448b89eb8961fe76b85fc2b4fbec0ce9732198aa5ded6

    • Size

      156KB

    • MD5

      8061856690cb606435fab350195a5aae

    • SHA1

      23a0b7c629b8d68207729e1a6eec6062ed4a80ba

    • SHA256

      2a8e8aa2739ab4c3a4c448b89eb8961fe76b85fc2b4fbec0ce9732198aa5ded6

    • SHA512

      5a16f535c2e28feadcb26ab43cf963abad6fe230a448d7120b7026cc05d2a6f763ed1caf80488c53deb16abc35c8e9df4969241b89315896cfefdea4b52acf34

    • SSDEEP

      3072:xYyEpMnRPTLmEpMLRPTL3EpMoRPTL8EpMFRPTLVEpMGRPTL5j9EX/imvMC9EXMiJ:x8nXH+82W65ouGK

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks