General

  • Target

    d619202d7cf025dda58dc23cb9ecf2e571e86abcbcbb4db6b2c40234fb27eefd

  • Size

    120KB

  • Sample

    241216-d44yjatmdm

  • MD5

    bfc69a4f69252f97061b9edec1256684

  • SHA1

    72dfb4b1a5ad38b4ac03f00f959a2cd5fd6f3d51

  • SHA256

    d619202d7cf025dda58dc23cb9ecf2e571e86abcbcbb4db6b2c40234fb27eefd

  • SHA512

    a7adc1675939f9a2af4c684db5e31ee2cf34f595b93ee75f0caa23191f4eae3d33bd536ad1da239919cefaa9a94097af6af590670c0b2da539486835f48edab2

  • SSDEEP

    3072:B8hgEkAFs/tcPWln92Xu4hZjfn+zaGKfZVNGT/7:A6Ay/iPWN92BhZrYWfGj

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d619202d7cf025dda58dc23cb9ecf2e571e86abcbcbb4db6b2c40234fb27eefd

    • Size

      120KB

    • MD5

      bfc69a4f69252f97061b9edec1256684

    • SHA1

      72dfb4b1a5ad38b4ac03f00f959a2cd5fd6f3d51

    • SHA256

      d619202d7cf025dda58dc23cb9ecf2e571e86abcbcbb4db6b2c40234fb27eefd

    • SHA512

      a7adc1675939f9a2af4c684db5e31ee2cf34f595b93ee75f0caa23191f4eae3d33bd536ad1da239919cefaa9a94097af6af590670c0b2da539486835f48edab2

    • SSDEEP

      3072:B8hgEkAFs/tcPWln92Xu4hZjfn+zaGKfZVNGT/7:A6Ay/iPWN92BhZrYWfGj

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks