General

  • Target

    5c2bfb87d0f148c5378b4d1176377811bf6445d860277be216f1915efb84f38f

  • Size

    120KB

  • Sample

    241215-2qey9a1kbs

  • MD5

    e0e06aeb60a66ae25e9fd6fb58187575

  • SHA1

    e48bd8df1c37e76a6b775b2a83fc56053046f51d

  • SHA256

    5c2bfb87d0f148c5378b4d1176377811bf6445d860277be216f1915efb84f38f

  • SHA512

    eaecc41055fb62a6ef40d82ba67824ebc41c89c54c57e8c35519dfaa1da4d8a8d45412919d7b99813c1d10af8c9d1d8808fd226fe4609b925026b91c2fc6e449

  • SSDEEP

    1536:SGkXH/WHJ8nil3JyZOPgHyLQYAE3RyfVsb5oavirIeeY53fi6eKO:QXH/88nilkOPpLQCAybfiUkq6

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      5c2bfb87d0f148c5378b4d1176377811bf6445d860277be216f1915efb84f38f

    • Size

      120KB

    • MD5

      e0e06aeb60a66ae25e9fd6fb58187575

    • SHA1

      e48bd8df1c37e76a6b775b2a83fc56053046f51d

    • SHA256

      5c2bfb87d0f148c5378b4d1176377811bf6445d860277be216f1915efb84f38f

    • SHA512

      eaecc41055fb62a6ef40d82ba67824ebc41c89c54c57e8c35519dfaa1da4d8a8d45412919d7b99813c1d10af8c9d1d8808fd226fe4609b925026b91c2fc6e449

    • SSDEEP

      1536:SGkXH/WHJ8nil3JyZOPgHyLQYAE3RyfVsb5oavirIeeY53fi6eKO:QXH/88nilkOPpLQCAybfiUkq6

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks