General

  • Target

    2bcf823d7aaa757b5bf0a00bb815f0921db21aa8245b7a8c252a834fae80e929

  • Size

    120KB

  • Sample

    241216-zmh6ds1kcp

  • MD5

    67b73e214f278a2c9bb410182dc90445

  • SHA1

    5e40715459970e32871167e6653fc8f5dcf7fa75

  • SHA256

    2bcf823d7aaa757b5bf0a00bb815f0921db21aa8245b7a8c252a834fae80e929

  • SHA512

    f05b89e951f744ea3623e4dd6b1f62b42f4b638fa1f077ea2695aa6fb84fd8bc1f875c0b0124bb6a10337502e1ac907c371c80d9f828de8013c0e54dc3be3d47

  • SSDEEP

    1536:Oo1T9ou2Dfyv0z45xilWqgqALTmF+m1ZZsZ4/fk1s32cr:j9duHqw2LybrysG

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2bcf823d7aaa757b5bf0a00bb815f0921db21aa8245b7a8c252a834fae80e929

    • Size

      120KB

    • MD5

      67b73e214f278a2c9bb410182dc90445

    • SHA1

      5e40715459970e32871167e6653fc8f5dcf7fa75

    • SHA256

      2bcf823d7aaa757b5bf0a00bb815f0921db21aa8245b7a8c252a834fae80e929

    • SHA512

      f05b89e951f744ea3623e4dd6b1f62b42f4b638fa1f077ea2695aa6fb84fd8bc1f875c0b0124bb6a10337502e1ac907c371c80d9f828de8013c0e54dc3be3d47

    • SSDEEP

      1536:Oo1T9ou2Dfyv0z45xilWqgqALTmF+m1ZZsZ4/fk1s32cr:j9duHqw2LybrysG

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks