General

  • Target

    c02e45d69880bd0e389c9567b992e1f5cb26f352f0988f60fa0e6e67e0c7a9e9

  • Size

    65KB

  • Sample

    241219-dlpqwsvlbx

  • MD5

    937b33522756c8e52e9a821cbf81689e

  • SHA1

    e513b0b21fbf16ac7393e66af5646bbdb2b63139

  • SHA256

    c02e45d69880bd0e389c9567b992e1f5cb26f352f0988f60fa0e6e67e0c7a9e9

  • SHA512

    12f693c6e039665b6a7821d43d150d63a4e0831f9c5b8fdc0bf01824fd403833bae1dd201791a315b70807f8749cde4fc11d84d0f262696ad48fcb69300d70a3

  • SSDEEP

    1536:Xr/Rg58nBgGfbBrqhY9v+Tyovnpo8+R1rtI9tBXY6y0k:b9BVrR9vPOnmpRytBX7Nk

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c02e45d69880bd0e389c9567b992e1f5cb26f352f0988f60fa0e6e67e0c7a9e9

    • Size

      65KB

    • MD5

      937b33522756c8e52e9a821cbf81689e

    • SHA1

      e513b0b21fbf16ac7393e66af5646bbdb2b63139

    • SHA256

      c02e45d69880bd0e389c9567b992e1f5cb26f352f0988f60fa0e6e67e0c7a9e9

    • SHA512

      12f693c6e039665b6a7821d43d150d63a4e0831f9c5b8fdc0bf01824fd403833bae1dd201791a315b70807f8749cde4fc11d84d0f262696ad48fcb69300d70a3

    • SSDEEP

      1536:Xr/Rg58nBgGfbBrqhY9v+Tyovnpo8+R1rtI9tBXY6y0k:b9BVrR9vPOnmpRytBX7Nk

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks