General

  • Target

    8667ee877e9bf404171b22b41d0d8ad5578d4e6d6d52f272de89c48f1818bdbe

  • Size

    120KB

  • Sample

    241216-apdagswmgn

  • MD5

    e556a9367e304401a1cc371ac88c925d

  • SHA1

    333c1712469d7cec53bda8da8ab4e73f0dfe53f0

  • SHA256

    8667ee877e9bf404171b22b41d0d8ad5578d4e6d6d52f272de89c48f1818bdbe

  • SHA512

    cfdd0ffe792a41d6c3c84c19192d8c05886e3b3d46e8e953e9fb63d0cc5aa7c5cd2da1c5622a2482ebc1a288800c593751f23bd8e550d992bd92d61047296661

  • SSDEEP

    3072:/fPtnpWBsL8t4WMRJpqvCSE70W8eAaV2w:XyskJMrgO7DAO2

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8667ee877e9bf404171b22b41d0d8ad5578d4e6d6d52f272de89c48f1818bdbe

    • Size

      120KB

    • MD5

      e556a9367e304401a1cc371ac88c925d

    • SHA1

      333c1712469d7cec53bda8da8ab4e73f0dfe53f0

    • SHA256

      8667ee877e9bf404171b22b41d0d8ad5578d4e6d6d52f272de89c48f1818bdbe

    • SHA512

      cfdd0ffe792a41d6c3c84c19192d8c05886e3b3d46e8e953e9fb63d0cc5aa7c5cd2da1c5622a2482ebc1a288800c593751f23bd8e550d992bd92d61047296661

    • SSDEEP

      3072:/fPtnpWBsL8t4WMRJpqvCSE70W8eAaV2w:XyskJMrgO7DAO2

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks