General

  • Target

    28ec896b8b701fba3b507b7ee0d9c2932b5e2517a332344ae1d447d9d6554504

  • Size

    120KB

  • Sample

    241216-ze9nda1jcn

  • MD5

    bd0d49f7d733d1b4daa3bcf9dfd78e13

  • SHA1

    318d8d9f72239d65774868b540251519b7daa833

  • SHA256

    28ec896b8b701fba3b507b7ee0d9c2932b5e2517a332344ae1d447d9d6554504

  • SHA512

    b0391246a880ed321cded42500a9df535cc61eade7efdb3fefc37a7902c6185e98470fdb8cac85784e46cfb1e4a3d1d9e56ac843a2066004ac8376be908bb761

  • SSDEEP

    3072:ICh8HZZDtsBrp55fz4xD5DXS8ibvMxVBhWb:RgXDtwr75fodS8LZh

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      28ec896b8b701fba3b507b7ee0d9c2932b5e2517a332344ae1d447d9d6554504

    • Size

      120KB

    • MD5

      bd0d49f7d733d1b4daa3bcf9dfd78e13

    • SHA1

      318d8d9f72239d65774868b540251519b7daa833

    • SHA256

      28ec896b8b701fba3b507b7ee0d9c2932b5e2517a332344ae1d447d9d6554504

    • SHA512

      b0391246a880ed321cded42500a9df535cc61eade7efdb3fefc37a7902c6185e98470fdb8cac85784e46cfb1e4a3d1d9e56ac843a2066004ac8376be908bb761

    • SSDEEP

      3072:ICh8HZZDtsBrp55fz4xD5DXS8ibvMxVBhWb:RgXDtwr75fodS8LZh

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks