General

  • Target

    51aa340623368e3706835cfb3cd429fca217bc7cf269e8f70491728114614a3f

  • Size

    120KB

  • Sample

    241211-1n1x9stqaj

  • MD5

    6bceed4cb39bc230e5cc874ec8c1b0a4

  • SHA1

    027361fffff1ecf051c5937dbd39191bf3254392

  • SHA256

    51aa340623368e3706835cfb3cd429fca217bc7cf269e8f70491728114614a3f

  • SHA512

    3e42c2617986ad266f8986a738fa0ba1a9654842754adc0e5f478e8688de8c3a3a7ae6c1bf06b0baa4765a234278d47064ec625953f6de857ea79646771d1890

  • SSDEEP

    1536:JMsjQe8wO6Bf9ilPScPlKMgui0hjIxOMRKb+e128q/bllNGTZP4bzG90kb4uY6OX:DMelipScuKxMRK6e7YYTZPM60kk7L

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      51aa340623368e3706835cfb3cd429fca217bc7cf269e8f70491728114614a3f

    • Size

      120KB

    • MD5

      6bceed4cb39bc230e5cc874ec8c1b0a4

    • SHA1

      027361fffff1ecf051c5937dbd39191bf3254392

    • SHA256

      51aa340623368e3706835cfb3cd429fca217bc7cf269e8f70491728114614a3f

    • SHA512

      3e42c2617986ad266f8986a738fa0ba1a9654842754adc0e5f478e8688de8c3a3a7ae6c1bf06b0baa4765a234278d47064ec625953f6de857ea79646771d1890

    • SSDEEP

      1536:JMsjQe8wO6Bf9ilPScPlKMgui0hjIxOMRKb+e128q/bllNGTZP4bzG90kb4uY6OX:DMelipScuKxMRK6e7YYTZPM60kk7L

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks