General

  • Target

    23cdaac9a5b2798d3a9f576a42e4ca33ba6366c214ea448d942f65b599721882

  • Size

    815KB

  • Sample

    241211-dnt4dsxrej

  • MD5

    4004aca2098153e39610b6ff73ea0532

  • SHA1

    5a740915ae47da5f4c707301c5c4370aeae03b39

  • SHA256

    23cdaac9a5b2798d3a9f576a42e4ca33ba6366c214ea448d942f65b599721882

  • SHA512

    749713753e29ae4cdb61dd5af365cd5c7215ea970fb53b1f84b1d2674f762b97ac841f1813ae18e94e830d62e93588588a3862d1599dcb9d3980a55028539012

  • SSDEEP

    12288:QKV2TKHPZWkgare8jmCNFGIVX+Ffko39Nhy1VUFI/44OJWE9W:QulqXI1+Fsy9NhOVUFqIWgW

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      23cdaac9a5b2798d3a9f576a42e4ca33ba6366c214ea448d942f65b599721882

    • Size

      815KB

    • MD5

      4004aca2098153e39610b6ff73ea0532

    • SHA1

      5a740915ae47da5f4c707301c5c4370aeae03b39

    • SHA256

      23cdaac9a5b2798d3a9f576a42e4ca33ba6366c214ea448d942f65b599721882

    • SHA512

      749713753e29ae4cdb61dd5af365cd5c7215ea970fb53b1f84b1d2674f762b97ac841f1813ae18e94e830d62e93588588a3862d1599dcb9d3980a55028539012

    • SSDEEP

      12288:QKV2TKHPZWkgare8jmCNFGIVX+Ffko39Nhy1VUFI/44OJWE9W:QulqXI1+Fsy9NhOVUFqIWgW

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks