General

  • Target

    20a620aac4fa6b2102e0e1831c2a73ece858187087ed80ede3e1da50e60e3c31

  • Size

    922KB

  • Sample

    241213-ndfhcswqbt

  • MD5

    e44de64095bd4fef9f8a0f5c31a044ad

  • SHA1

    1f534c91e334b67c0b7e9382619048d84a13318b

  • SHA256

    20a620aac4fa6b2102e0e1831c2a73ece858187087ed80ede3e1da50e60e3c31

  • SHA512

    51e180b2ff01986cfd6d200e1bfeddee77bf594ccf8730aeeb8579b687eb5acf0286f3986f95a1cd94a17985a485bf4575644b2e3bafaaa8c3f864f08a356d66

  • SSDEEP

    24576:/J+xweX1UEKkP7wKtAlZlb0fMMMMMMMMMMMMM1MMMCMMMMiIApMcMMi/MMTrLBio:0vP7eZlb0fMMMMMMMMMMMMM1MMMCMMMU

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      20a620aac4fa6b2102e0e1831c2a73ece858187087ed80ede3e1da50e60e3c31

    • Size

      922KB

    • MD5

      e44de64095bd4fef9f8a0f5c31a044ad

    • SHA1

      1f534c91e334b67c0b7e9382619048d84a13318b

    • SHA256

      20a620aac4fa6b2102e0e1831c2a73ece858187087ed80ede3e1da50e60e3c31

    • SHA512

      51e180b2ff01986cfd6d200e1bfeddee77bf594ccf8730aeeb8579b687eb5acf0286f3986f95a1cd94a17985a485bf4575644b2e3bafaaa8c3f864f08a356d66

    • SSDEEP

      24576:/J+xweX1UEKkP7wKtAlZlb0fMMMMMMMMMMMMM1MMMCMMMMiIApMcMMi/MMTrLBio:0vP7eZlb0fMMMMMMMMMMMMM1MMMCMMMU

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks