General

  • Target

    45ce6906c6d3470fd73ed791dcc841d202011f09323d78c8b38d6e33dfdb2804

  • Size

    629KB

  • Sample

    241211-3bq9easkat

  • MD5

    b772f166ea855f7b09fb1162fc1c2559

  • SHA1

    d40794b96e15a694567620b0aafe5e2c9e7a5cd7

  • SHA256

    45ce6906c6d3470fd73ed791dcc841d202011f09323d78c8b38d6e33dfdb2804

  • SHA512

    10010ac46606e271fd5cd67cdd105a90caeeae1cae5fba77135fa3ea61b18dd62c910276626c9d795c78d2fc65ad24d6c62e66b1fc88b43108985c199723a5b3

  • SSDEEP

    12288:iDLXYsuYK9uw7Ii0aWFKvzvaGW91WIeGegTt1Jr0jm8i1T7kicCyD8naXFN:iDLoVhb7Ab9d51Y9i1eCyonaXFN

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      45ce6906c6d3470fd73ed791dcc841d202011f09323d78c8b38d6e33dfdb2804

    • Size

      629KB

    • MD5

      b772f166ea855f7b09fb1162fc1c2559

    • SHA1

      d40794b96e15a694567620b0aafe5e2c9e7a5cd7

    • SHA256

      45ce6906c6d3470fd73ed791dcc841d202011f09323d78c8b38d6e33dfdb2804

    • SHA512

      10010ac46606e271fd5cd67cdd105a90caeeae1cae5fba77135fa3ea61b18dd62c910276626c9d795c78d2fc65ad24d6c62e66b1fc88b43108985c199723a5b3

    • SSDEEP

      12288:iDLXYsuYK9uw7Ii0aWFKvzvaGW91WIeGegTt1Jr0jm8i1T7kicCyD8naXFN:iDLoVhb7Ab9d51Y9i1eCyonaXFN

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks