General

  • Target

    c821308033101c4c0fd19723050367e939d63db08d5bbef3855a035e0d0ab3e3

  • Size

    120KB

  • Sample

    241216-dk8sda1lcs

  • MD5

    8ed272c050d75adc1c566f56ede276ac

  • SHA1

    d6be7032f93fe6ad4777ed3e16b81073a01fb689

  • SHA256

    c821308033101c4c0fd19723050367e939d63db08d5bbef3855a035e0d0ab3e3

  • SHA512

    3a2649f08bb3b1e46dd5967c78ea95c6a57396576756384a8715056d9eafa75819fbe7cb5f0892a60444ba8a7c5e5dfd50f18832905d42a03a4876a3c52863d9

  • SSDEEP

    3072:5mbwnnOSaIKMnpI7dd938vOpcpGIfyh/Xrx:gsnnOSHKMnQ938vOmpGIWXrx

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c821308033101c4c0fd19723050367e939d63db08d5bbef3855a035e0d0ab3e3

    • Size

      120KB

    • MD5

      8ed272c050d75adc1c566f56ede276ac

    • SHA1

      d6be7032f93fe6ad4777ed3e16b81073a01fb689

    • SHA256

      c821308033101c4c0fd19723050367e939d63db08d5bbef3855a035e0d0ab3e3

    • SHA512

      3a2649f08bb3b1e46dd5967c78ea95c6a57396576756384a8715056d9eafa75819fbe7cb5f0892a60444ba8a7c5e5dfd50f18832905d42a03a4876a3c52863d9

    • SSDEEP

      3072:5mbwnnOSaIKMnpI7dd938vOpcpGIfyh/Xrx:gsnnOSHKMnQ938vOmpGIWXrx

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks