General

  • Target

    9794efe79fb0b7e1ecbd554cdd635146eaa1dff73dfeaf4f4574a7a343527c78

  • Size

    1.4MB

  • Sample

    241212-nj5z7ssmaw

  • MD5

    7bc998d7637eb46802924896b470eef0

  • SHA1

    be344335e6cfa5e8fa251ae5fa06e15466c815a4

  • SHA256

    9794efe79fb0b7e1ecbd554cdd635146eaa1dff73dfeaf4f4574a7a343527c78

  • SHA512

    1bf0222cf666ca94fe3756880dd6f657627bf169149b69b0cbdf0394e184dfa4ad9409e039ae2676f6f5697da1572649ec39264cb36da190e5e45e52d77c6039

  • SSDEEP

    24576:HGyD4jD8crjNPIYINaawdLnsNnIrnshZGCYcfJ5ievr:QkB5rooCnsOCYcfJ5ievr

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      9794efe79fb0b7e1ecbd554cdd635146eaa1dff73dfeaf4f4574a7a343527c78

    • Size

      1.4MB

    • MD5

      7bc998d7637eb46802924896b470eef0

    • SHA1

      be344335e6cfa5e8fa251ae5fa06e15466c815a4

    • SHA256

      9794efe79fb0b7e1ecbd554cdd635146eaa1dff73dfeaf4f4574a7a343527c78

    • SHA512

      1bf0222cf666ca94fe3756880dd6f657627bf169149b69b0cbdf0394e184dfa4ad9409e039ae2676f6f5697da1572649ec39264cb36da190e5e45e52d77c6039

    • SSDEEP

      24576:HGyD4jD8crjNPIYINaawdLnsNnIrnshZGCYcfJ5ievr:QkB5rooCnsOCYcfJ5ievr

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks