General

  • Target

    091a7dea56b149ec4603cb1fab681da93a179a1243083dcd9bfd32e3abadaf14

  • Size

    1.5MB

  • Sample

    241213-g141xazrgt

  • MD5

    767b22aa6ee583618e36e9b3121344cb

  • SHA1

    fb64c3a5fd4fa75878188ad6502d2c59b59cd986

  • SHA256

    091a7dea56b149ec4603cb1fab681da93a179a1243083dcd9bfd32e3abadaf14

  • SHA512

    6d6b08861d1ccc2c9514e09f0b4c3024c2e661c1437a90bf1dd3620d9c055210c310c9d78f923ed4d21e75c338acd879613fe483775bfc7be32e9ee41d7718db

  • SSDEEP

    24576:06tTD5H4yXRLIZv5ezD8Ye5C/yjlk/Nn6fMoSsnRkB4cKPxEC4:rD5Yyhg5Ct5cYsnRkBLK5EZ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      091a7dea56b149ec4603cb1fab681da93a179a1243083dcd9bfd32e3abadaf14

    • Size

      1.5MB

    • MD5

      767b22aa6ee583618e36e9b3121344cb

    • SHA1

      fb64c3a5fd4fa75878188ad6502d2c59b59cd986

    • SHA256

      091a7dea56b149ec4603cb1fab681da93a179a1243083dcd9bfd32e3abadaf14

    • SHA512

      6d6b08861d1ccc2c9514e09f0b4c3024c2e661c1437a90bf1dd3620d9c055210c310c9d78f923ed4d21e75c338acd879613fe483775bfc7be32e9ee41d7718db

    • SSDEEP

      24576:06tTD5H4yXRLIZv5ezD8Ye5C/yjlk/Nn6fMoSsnRkB4cKPxEC4:rD5Yyhg5Ct5cYsnRkBLK5EZ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks