General

  • Target

    588b028f7ab552a4d2b907c1d0298aea0e9f0d759c71efd01e392193b24c5847

  • Size

    120KB

  • Sample

    241217-2p1jka1mas

  • MD5

    dd4ca19c37badbb9bdc367bcdb89e517

  • SHA1

    32e136dd60f938734c9772ca304c41d77dce01c7

  • SHA256

    588b028f7ab552a4d2b907c1d0298aea0e9f0d759c71efd01e392193b24c5847

  • SHA512

    6a8a50d013e2084028b2a8ae14ba50af98c7a36d083f85ba79fd6faf5dc773745b4d8916671e97cf391de86005b0dea56e2b2036ed0332195c893a591e438727

  • SSDEEP

    3072:vfWxA9JYSxV2Lto4eX+9vGHfV9FoJ2/Ny:XW0JYSL6tRmeW7Fa2

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      588b028f7ab552a4d2b907c1d0298aea0e9f0d759c71efd01e392193b24c5847

    • Size

      120KB

    • MD5

      dd4ca19c37badbb9bdc367bcdb89e517

    • SHA1

      32e136dd60f938734c9772ca304c41d77dce01c7

    • SHA256

      588b028f7ab552a4d2b907c1d0298aea0e9f0d759c71efd01e392193b24c5847

    • SHA512

      6a8a50d013e2084028b2a8ae14ba50af98c7a36d083f85ba79fd6faf5dc773745b4d8916671e97cf391de86005b0dea56e2b2036ed0332195c893a591e438727

    • SSDEEP

      3072:vfWxA9JYSxV2Lto4eX+9vGHfV9FoJ2/Ny:XW0JYSL6tRmeW7Fa2

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks