General

  • Target

    fa0cc5005d94ee2eed4d21f9536c28f7d531c20849b16525ad00cf13ff29fca2

  • Size

    274KB

  • Sample

    241218-jf8jpszlcy

  • MD5

    de40e9fd33ef27f7c61f5c6fb86cefe9

  • SHA1

    2e30b829fb349f77bc82dc082d3dd1a152d40f9d

  • SHA256

    fa0cc5005d94ee2eed4d21f9536c28f7d531c20849b16525ad00cf13ff29fca2

  • SHA512

    b1a04f6e1925798023fb34c8989fd5472572665b2a498f7bd63307108608232c1c4d26068b90ebf587de0d800a471f784c99238f45c67fe91e0ddcf25a58063d

  • SSDEEP

    3072:znUoxnEYsnR3eP6riCpfiLScKcHyY6nMFQF0/7:znUo9+hS6rdpfiLhRHyYSq/

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      fa0cc5005d94ee2eed4d21f9536c28f7d531c20849b16525ad00cf13ff29fca2

    • Size

      274KB

    • MD5

      de40e9fd33ef27f7c61f5c6fb86cefe9

    • SHA1

      2e30b829fb349f77bc82dc082d3dd1a152d40f9d

    • SHA256

      fa0cc5005d94ee2eed4d21f9536c28f7d531c20849b16525ad00cf13ff29fca2

    • SHA512

      b1a04f6e1925798023fb34c8989fd5472572665b2a498f7bd63307108608232c1c4d26068b90ebf587de0d800a471f784c99238f45c67fe91e0ddcf25a58063d

    • SSDEEP

      3072:znUoxnEYsnR3eP6riCpfiLScKcHyY6nMFQF0/7:znUo9+hS6rdpfiLhRHyYSq/

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks