General

  • Target

    7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de

  • Size

    767KB

  • Sample

    241216-313czatphx

  • MD5

    f48c142ac82f6874d1256c5f266a6ef2

  • SHA1

    bb1d810cfa29eab5d37543ddca8b643887ac5855

  • SHA256

    7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de

  • SHA512

    6d038c06a69c9cf446b002d1cc9297051e87478e6a7d755152a5309ca587b37b727d13903a322a4ffa757d95024c26ef4d2b06eb3856d9f9f79fa5ee705a4def

  • SSDEEP

    12288:AdsBWptwlMYHUVmkzTyuhdQFdOq8mC4qJQAwXIoccqWT8kSHi6GP0gd6m56FliAV:AW0pmmY0Vm+1hd5t7w9ccGC6GPB8iAV

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de

    • Size

      767KB

    • MD5

      f48c142ac82f6874d1256c5f266a6ef2

    • SHA1

      bb1d810cfa29eab5d37543ddca8b643887ac5855

    • SHA256

      7a6be4c5fcaace12714e5bd3cb170b645655c79997cbcd7d7fcb4a5b1a0bd2de

    • SHA512

      6d038c06a69c9cf446b002d1cc9297051e87478e6a7d755152a5309ca587b37b727d13903a322a4ffa757d95024c26ef4d2b06eb3856d9f9f79fa5ee705a4def

    • SSDEEP

      12288:AdsBWptwlMYHUVmkzTyuhdQFdOq8mC4qJQAwXIoccqWT8kSHi6GP0gd6m56FliAV:AW0pmmY0Vm+1hd5t7w9ccGC6GPB8iAV

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks