General

  • Target

    14f30876b658ccd0bb4d77fc5975c26314132eb54d616e2a7f525c140e0e7216

  • Size

    682KB

  • Sample

    241215-zgmlmawnfx

  • MD5

    73779e52f35163dbad48058ff828640b

  • SHA1

    8e0beab00894023bf60101387c716b13d2cd5f8b

  • SHA256

    14f30876b658ccd0bb4d77fc5975c26314132eb54d616e2a7f525c140e0e7216

  • SHA512

    b77ece7ac9fab0fc1d9549b5756fa88eb571c32a38c8d4d3962a6f7d3439c9fdbbcc458b43b8488248f782dff635685f86bc536d435d1c8a2688dac665898207

  • SSDEEP

    12288:dt8aYvzsldbus3mVxcFKuhCGHMhCoFkQigCxtFitM5mN6OWh:d3TGpusGsvFkQiRFUM263h

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      14f30876b658ccd0bb4d77fc5975c26314132eb54d616e2a7f525c140e0e7216

    • Size

      682KB

    • MD5

      73779e52f35163dbad48058ff828640b

    • SHA1

      8e0beab00894023bf60101387c716b13d2cd5f8b

    • SHA256

      14f30876b658ccd0bb4d77fc5975c26314132eb54d616e2a7f525c140e0e7216

    • SHA512

      b77ece7ac9fab0fc1d9549b5756fa88eb571c32a38c8d4d3962a6f7d3439c9fdbbcc458b43b8488248f782dff635685f86bc536d435d1c8a2688dac665898207

    • SSDEEP

      12288:dt8aYvzsldbus3mVxcFKuhCGHMhCoFkQigCxtFitM5mN6OWh:d3TGpusGsvFkQiRFUM263h

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks