General

  • Target

    293859d3ae0f4b8ecfdf6e57d969aabafe1760c4548effba03bad736e49634f1

  • Size

    120KB

  • Sample

    241207-zpk3rssrey

  • MD5

    1aee3e588c26fcd8c7bf630aafd574ef

  • SHA1

    94f3aa5eb3031fc66c790dea7e05f839a570f65e

  • SHA256

    293859d3ae0f4b8ecfdf6e57d969aabafe1760c4548effba03bad736e49634f1

  • SHA512

    af2fbc9655cdb975f1362af2d34960c23711fee09cf2f8d16b6edccb368baaa43d13309d87c523a641f842266934226e00b8269ab154bf2cf68f7a63f1d5c39c

  • SSDEEP

    3072:AsN1r8sAwk4yPUwUQMeXNV2CzxXIrRLXLRY:AsY7PUwUQLzV6RPRY

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      293859d3ae0f4b8ecfdf6e57d969aabafe1760c4548effba03bad736e49634f1

    • Size

      120KB

    • MD5

      1aee3e588c26fcd8c7bf630aafd574ef

    • SHA1

      94f3aa5eb3031fc66c790dea7e05f839a570f65e

    • SHA256

      293859d3ae0f4b8ecfdf6e57d969aabafe1760c4548effba03bad736e49634f1

    • SHA512

      af2fbc9655cdb975f1362af2d34960c23711fee09cf2f8d16b6edccb368baaa43d13309d87c523a641f842266934226e00b8269ab154bf2cf68f7a63f1d5c39c

    • SSDEEP

      3072:AsN1r8sAwk4yPUwUQMeXNV2CzxXIrRLXLRY:AsY7PUwUQLzV6RPRY

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks