General

  • Target

    3180b400721d12d08f1bbb3c824387808072084d6f6117b92616c4d5ca52d155

  • Size

    120KB

  • Sample

    241216-zr8xls1lak

  • MD5

    e7a2dc2e4425367d4c57944ae02e1f05

  • SHA1

    1042b169c08b787b2cf2008bacd097b772e3abc4

  • SHA256

    3180b400721d12d08f1bbb3c824387808072084d6f6117b92616c4d5ca52d155

  • SHA512

    151b9db3770e993fe04b817730828ed0a830fec5ed0cbf7b02120b6cdec3ff8f281b7b78c4fa4008a839e47c72975f1d158d0d50341bbdddb57f57fa44dc6093

  • SSDEEP

    3072:O56afCMSHn07cvlm7gWa3k010Cx+/N1TY:P4CMSH0wvlwLJ010cwn0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      3180b400721d12d08f1bbb3c824387808072084d6f6117b92616c4d5ca52d155

    • Size

      120KB

    • MD5

      e7a2dc2e4425367d4c57944ae02e1f05

    • SHA1

      1042b169c08b787b2cf2008bacd097b772e3abc4

    • SHA256

      3180b400721d12d08f1bbb3c824387808072084d6f6117b92616c4d5ca52d155

    • SHA512

      151b9db3770e993fe04b817730828ed0a830fec5ed0cbf7b02120b6cdec3ff8f281b7b78c4fa4008a839e47c72975f1d158d0d50341bbdddb57f57fa44dc6093

    • SSDEEP

      3072:O56afCMSHn07cvlm7gWa3k010Cx+/N1TY:P4CMSH0wvlwLJ010cwn0

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks