General

  • Target

    13016f0c24adcbfe442ca42925c63092096a11477fa87e7ab5ed45796b8e255d

  • Size

    120KB

  • Sample

    241211-yg1mta1jaj

  • MD5

    ea956eb7d76bc974e76aaaadf9676373

  • SHA1

    000f3e1a13eaae8ba560865e7777e603ac6fb1c1

  • SHA256

    13016f0c24adcbfe442ca42925c63092096a11477fa87e7ab5ed45796b8e255d

  • SHA512

    ac9127bd88e23ba153ebce2ed3f160f1a53de60c2932302877723746a3f6271bab5acf27a7d11d302abed550aac364da2d165e2aac4915825e18e3e4ec664c27

  • SSDEEP

    1536:orK5RBCtk71WMFRQhWktAOIf8Sax4mjjcT41/u2G9mk1/lPr76HHYmCPgMT:oQCtk71+RPIYx4EjOtPr76H4mCPgMT

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      13016f0c24adcbfe442ca42925c63092096a11477fa87e7ab5ed45796b8e255d

    • Size

      120KB

    • MD5

      ea956eb7d76bc974e76aaaadf9676373

    • SHA1

      000f3e1a13eaae8ba560865e7777e603ac6fb1c1

    • SHA256

      13016f0c24adcbfe442ca42925c63092096a11477fa87e7ab5ed45796b8e255d

    • SHA512

      ac9127bd88e23ba153ebce2ed3f160f1a53de60c2932302877723746a3f6271bab5acf27a7d11d302abed550aac364da2d165e2aac4915825e18e3e4ec664c27

    • SSDEEP

      1536:orK5RBCtk71WMFRQhWktAOIf8Sax4mjjcT41/u2G9mk1/lPr76HHYmCPgMT:oQCtk71+RPIYx4EjOtPr76H4mCPgMT

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks