General

  • Target

    3e607f637b62d7069f813ab9d60742a6ba42861cbe1b981c88d8721b8c6e6411

  • Size

    2.4MB

  • Sample

    241213-g3keaa1jct

  • MD5

    6211ec568f1b84b517c481c39f26429e

  • SHA1

    8bc72186852231612e998dac6f06974893b8853c

  • SHA256

    3e607f637b62d7069f813ab9d60742a6ba42861cbe1b981c88d8721b8c6e6411

  • SHA512

    e29f157ddae7dc57ba69696699e2156a5dd8673e12444af25ded02cf3ba0f31a107a677f06a678b43eca5fd4ff0a1e3abaa37059f55e131a59fe78ba5800a386

  • SSDEEP

    49152:c+bil8KtTt0dMdRhfU8g9KUY6VPhPIiH6HU/7xSNBy9HAI:xOl8KtTCdsLbg99KC6agI

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      3e607f637b62d7069f813ab9d60742a6ba42861cbe1b981c88d8721b8c6e6411

    • Size

      2.4MB

    • MD5

      6211ec568f1b84b517c481c39f26429e

    • SHA1

      8bc72186852231612e998dac6f06974893b8853c

    • SHA256

      3e607f637b62d7069f813ab9d60742a6ba42861cbe1b981c88d8721b8c6e6411

    • SHA512

      e29f157ddae7dc57ba69696699e2156a5dd8673e12444af25ded02cf3ba0f31a107a677f06a678b43eca5fd4ff0a1e3abaa37059f55e131a59fe78ba5800a386

    • SSDEEP

      49152:c+bil8KtTt0dMdRhfU8g9KUY6VPhPIiH6HU/7xSNBy9HAI:xOl8KtTCdsLbg99KC6agI

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks