General

  • Target

    464fb889336653c7bef3b60598e65656af46da99662932aaecb67c1a8320d590

  • Size

    3.2MB

  • Sample

    241212-n3lexatjfz

  • MD5

    db7d87024214a04f9382ea8805e9262c

  • SHA1

    ef079ffa01c516485594378d99cdfd4a70299525

  • SHA256

    464fb889336653c7bef3b60598e65656af46da99662932aaecb67c1a8320d590

  • SHA512

    368b27663536d67ade3e0c1a6cf27411476d970627ae9e4e683ffb3eaf52671e2458e5355707e54eb5e7cdbd0370420018ede5f2a146e4c6fbff79c362b2fe9b

  • SSDEEP

    49152:K94L1knB0+xk92wFKtPc91o49i3mBt1ik3YG2/CMxL6HpV5gHXHaMYdECBExSDDJ:NLTKShw9dSIyqM3iu+ZVgQgYQ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      464fb889336653c7bef3b60598e65656af46da99662932aaecb67c1a8320d590

    • Size

      3.2MB

    • MD5

      db7d87024214a04f9382ea8805e9262c

    • SHA1

      ef079ffa01c516485594378d99cdfd4a70299525

    • SHA256

      464fb889336653c7bef3b60598e65656af46da99662932aaecb67c1a8320d590

    • SHA512

      368b27663536d67ade3e0c1a6cf27411476d970627ae9e4e683ffb3eaf52671e2458e5355707e54eb5e7cdbd0370420018ede5f2a146e4c6fbff79c362b2fe9b

    • SSDEEP

      49152:K94L1knB0+xk92wFKtPc91o49i3mBt1ik3YG2/CMxL6HpV5gHXHaMYdECBExSDDJ:NLTKShw9dSIyqM3iu+ZVgQgYQ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks