General

  • Target

    2761d9cac0a88842100b74294422544c7e190d055e08ce4161645e21460d1a49

  • Size

    120KB

  • Sample

    241211-y642jaxlex

  • MD5

    df9930ac6278241ebc7c9981c5e11eaf

  • SHA1

    5bfd177fed0352e47fbc9fcc207a6a181a2e7922

  • SHA256

    2761d9cac0a88842100b74294422544c7e190d055e08ce4161645e21460d1a49

  • SHA512

    795fdc620c9ddf373e0d7760bb38fc1cb56a66c7e86894445806ccaa3d064c9aa972d86b5c6c044f6f71ba1175844ff7d08fad5cdbf75c543779e2c5be967ac1

  • SSDEEP

    1536:QBF9UCDfkL5Tfp9SZ9sYd7whiRPgT4JbSRnTCuixjztklsJXJ+MRaSht7tmrDy25:QBFAVKXsYq+inT0jZkaJ5+mftmrDy2

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2761d9cac0a88842100b74294422544c7e190d055e08ce4161645e21460d1a49

    • Size

      120KB

    • MD5

      df9930ac6278241ebc7c9981c5e11eaf

    • SHA1

      5bfd177fed0352e47fbc9fcc207a6a181a2e7922

    • SHA256

      2761d9cac0a88842100b74294422544c7e190d055e08ce4161645e21460d1a49

    • SHA512

      795fdc620c9ddf373e0d7760bb38fc1cb56a66c7e86894445806ccaa3d064c9aa972d86b5c6c044f6f71ba1175844ff7d08fad5cdbf75c543779e2c5be967ac1

    • SSDEEP

      1536:QBF9UCDfkL5Tfp9SZ9sYd7whiRPgT4JbSRnTCuixjztklsJXJ+MRaSht7tmrDy25:QBFAVKXsYq+inT0jZkaJ5+mftmrDy2

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks