General

  • Target

    c28e527ac8f361559c9e9959ca5bcab33437a7c7ebf265a91fe8776a7729c38e

  • Size

    571KB

  • Sample

    241210-vpcdea1kbv

  • MD5

    e41c0ff56a14f2516d8e773ddffbbd13

  • SHA1

    404ab31280d3c127361353bc73b5e672a8aadbbe

  • SHA256

    c28e527ac8f361559c9e9959ca5bcab33437a7c7ebf265a91fe8776a7729c38e

  • SHA512

    3017e8f22b4d067daeb750b2edc2809aebe85c33c23f63062eb0f61731dba08f9a28b73083e9673638cdfc01c9db49653342fa49ff7acb508ff79c94cf35816c

  • SSDEEP

    12288:0DS7M/bKaa5JT+Orwm7nVSshTRbd5GTDXxQKJ:MS04dwYVSsV5d5qyw

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c28e527ac8f361559c9e9959ca5bcab33437a7c7ebf265a91fe8776a7729c38e

    • Size

      571KB

    • MD5

      e41c0ff56a14f2516d8e773ddffbbd13

    • SHA1

      404ab31280d3c127361353bc73b5e672a8aadbbe

    • SHA256

      c28e527ac8f361559c9e9959ca5bcab33437a7c7ebf265a91fe8776a7729c38e

    • SHA512

      3017e8f22b4d067daeb750b2edc2809aebe85c33c23f63062eb0f61731dba08f9a28b73083e9673638cdfc01c9db49653342fa49ff7acb508ff79c94cf35816c

    • SSDEEP

      12288:0DS7M/bKaa5JT+Orwm7nVSshTRbd5GTDXxQKJ:MS04dwYVSsV5d5qyw

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks