General

  • Target

    ac1538b086450db655a1b965d83645e46e51a1b6ce9e3f6f106503a83eeb41f8

  • Size

    653KB

  • Sample

    241215-vvbn3a1jey

  • MD5

    ec3be31f1140a8570a20b1833a7e563a

  • SHA1

    21f55b0c6ca0052daa3d6ab2b0c7cec380fa9069

  • SHA256

    ac1538b086450db655a1b965d83645e46e51a1b6ce9e3f6f106503a83eeb41f8

  • SHA512

    51eb5c5de0799ee7f080e9267b9093a55107aeca6bfa46cf3ff24d11f820eeea2e67ede7e7e96462cfa1074350f852e43065a1daa4efa3f1361212b986064988

  • SSDEEP

    12288:T8MxLli5Dqsy4Kx7EkPdBdtueuu0Wdbcx07TBkezAQMGk+uU6qHdFEv:T8MHi5DuLtdBfLpk5QMGKTsdFEv

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ac1538b086450db655a1b965d83645e46e51a1b6ce9e3f6f106503a83eeb41f8

    • Size

      653KB

    • MD5

      ec3be31f1140a8570a20b1833a7e563a

    • SHA1

      21f55b0c6ca0052daa3d6ab2b0c7cec380fa9069

    • SHA256

      ac1538b086450db655a1b965d83645e46e51a1b6ce9e3f6f106503a83eeb41f8

    • SHA512

      51eb5c5de0799ee7f080e9267b9093a55107aeca6bfa46cf3ff24d11f820eeea2e67ede7e7e96462cfa1074350f852e43065a1daa4efa3f1361212b986064988

    • SSDEEP

      12288:T8MxLli5Dqsy4Kx7EkPdBdtueuu0Wdbcx07TBkezAQMGk+uU6qHdFEv:T8MHi5DuLtdBfLpk5QMGKTsdFEv

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks