General

  • Target

    974fb0c4362504b348b8b7282f0ddacc57b1ecb514008bd73735d157cf143c20

  • Size

    65KB

  • Sample

    241216-be925sxphq

  • MD5

    10b350fb0e2a2c541ee958cec364b7b3

  • SHA1

    7d71b380e045fad63c27b60566cc235fbe739467

  • SHA256

    974fb0c4362504b348b8b7282f0ddacc57b1ecb514008bd73735d157cf143c20

  • SHA512

    4e2b033b046de7b08224771a4f8767819846cceba3c7b5cde8e8c25d1eab190259f304fc49d2f49346f421ce1adeaa2820ea7a206ad444d5a9198b60eff72d59

  • SSDEEP

    1536:HWeXzb8j8QSMt+bH1oCM3sjbLkjBzXPV9Wo9kciPaGA:/NQz+Zol3YngBTPV9vLi+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      974fb0c4362504b348b8b7282f0ddacc57b1ecb514008bd73735d157cf143c20

    • Size

      65KB

    • MD5

      10b350fb0e2a2c541ee958cec364b7b3

    • SHA1

      7d71b380e045fad63c27b60566cc235fbe739467

    • SHA256

      974fb0c4362504b348b8b7282f0ddacc57b1ecb514008bd73735d157cf143c20

    • SHA512

      4e2b033b046de7b08224771a4f8767819846cceba3c7b5cde8e8c25d1eab190259f304fc49d2f49346f421ce1adeaa2820ea7a206ad444d5a9198b60eff72d59

    • SSDEEP

      1536:HWeXzb8j8QSMt+bH1oCM3sjbLkjBzXPV9Wo9kciPaGA:/NQz+Zol3YngBTPV9vLi+

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks