General

  • Target

    860a114198175e0fd24d4b54b348095995c25af560c2d5c7d96cf972721458a0

  • Size

    152KB

  • Sample

    241217-arvmjsvkhy

  • MD5

    897e33c24d0ca6a57fe8f7ccd886a2f9

  • SHA1

    229ffee22d2a520734738139b1e561f10cba554a

  • SHA256

    860a114198175e0fd24d4b54b348095995c25af560c2d5c7d96cf972721458a0

  • SHA512

    0299e612045022cac1a02a75fb7fdedd5e145ce5b7707cadbb8a3324983ad9bea8e0145aa3d929ebb3a6d199e462c6ead38b5c7f36760296a8ac8d4ef4fa53b7

  • SSDEEP

    3072:vXdx7zUB2oQBzcf8p3DtklPuYz+SPa6ZpTCj+bYHYGM4wF:vXvrywmPuWi8JYuF

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      860a114198175e0fd24d4b54b348095995c25af560c2d5c7d96cf972721458a0

    • Size

      152KB

    • MD5

      897e33c24d0ca6a57fe8f7ccd886a2f9

    • SHA1

      229ffee22d2a520734738139b1e561f10cba554a

    • SHA256

      860a114198175e0fd24d4b54b348095995c25af560c2d5c7d96cf972721458a0

    • SHA512

      0299e612045022cac1a02a75fb7fdedd5e145ce5b7707cadbb8a3324983ad9bea8e0145aa3d929ebb3a6d199e462c6ead38b5c7f36760296a8ac8d4ef4fa53b7

    • SSDEEP

      3072:vXdx7zUB2oQBzcf8p3DtklPuYz+SPa6ZpTCj+bYHYGM4wF:vXvrywmPuWi8JYuF

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks