General

  • Target

    e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf

  • Size

    120KB

  • Sample

    241216-ekz1xavker

  • MD5

    36ef8d9f850799f6681b1b0f36d77b14

  • SHA1

    9d63f151db59043bd89e9ccbdf486360bed57f54

  • SHA256

    e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf

  • SHA512

    bf9de43a58afefc44d235c463887984b7cf168e3c986675eaf9ecb4e9ee7d9062b4ae8180f264e38e893a6a5ae421f90c25eed7f6cfca22f2f4f6b2b8db94a41

  • SSDEEP

    3072:6jK8wjj91Rl/jBw79cA5A8q9kuP9jI4tQ:6Ozzb/twRcA5B2kuiL

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf

    • Size

      120KB

    • MD5

      36ef8d9f850799f6681b1b0f36d77b14

    • SHA1

      9d63f151db59043bd89e9ccbdf486360bed57f54

    • SHA256

      e089f803a0c4e085b25e73d57ed46244268ad1fb250ef22f546043db69e6eebf

    • SHA512

      bf9de43a58afefc44d235c463887984b7cf168e3c986675eaf9ecb4e9ee7d9062b4ae8180f264e38e893a6a5ae421f90c25eed7f6cfca22f2f4f6b2b8db94a41

    • SSDEEP

      3072:6jK8wjj91Rl/jBw79cA5A8q9kuP9jI4tQ:6Ozzb/twRcA5B2kuiL

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks