General

  • Target

    8b4475f67431e691e1327b09fa70e680350790277f0f9381579e33ea4f984427

  • Size

    1.9MB

  • Sample

    241212-aehgfsxqap

  • MD5

    143d6dc840ed6719b3f724351aac1df8

  • SHA1

    8f7df30a59b71fa028c073d8697fb3e2caaadfbd

  • SHA256

    8b4475f67431e691e1327b09fa70e680350790277f0f9381579e33ea4f984427

  • SHA512

    131c50d4b04282d1249f7f295af7b5a4232c1347f8b608352e750a303ff710cad8d1567b12da6f769eceffeb68ab333981d94dc1daf91877b41da271d2c8ee7a

  • SSDEEP

    24576:7IXWDA/CcfUFtnI4qxoSECvs+Mh2Hkn3333kG0woAJ5e15rV9L+msiJ/Y/UvhX6T:7I13f6nIdV02k0wRPiTh3Yus

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8b4475f67431e691e1327b09fa70e680350790277f0f9381579e33ea4f984427

    • Size

      1.9MB

    • MD5

      143d6dc840ed6719b3f724351aac1df8

    • SHA1

      8f7df30a59b71fa028c073d8697fb3e2caaadfbd

    • SHA256

      8b4475f67431e691e1327b09fa70e680350790277f0f9381579e33ea4f984427

    • SHA512

      131c50d4b04282d1249f7f295af7b5a4232c1347f8b608352e750a303ff710cad8d1567b12da6f769eceffeb68ab333981d94dc1daf91877b41da271d2c8ee7a

    • SSDEEP

      24576:7IXWDA/CcfUFtnI4qxoSECvs+Mh2Hkn3333kG0woAJ5e15rV9L+msiJ/Y/UvhX6T:7I13f6nIdV02k0wRPiTh3Yus

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks