General

  • Target

    0b0e16446091afe9ea4d92adae9012751374903dccfbad426b3878ca06e69462

  • Size

    120KB

  • Sample

    241219-ytx3fsykbv

  • MD5

    4d3336ebcc7be71a5f2f27a3c6d321c3

  • SHA1

    a12915e0f44315770d5da99cb1f41284933ffcf4

  • SHA256

    0b0e16446091afe9ea4d92adae9012751374903dccfbad426b3878ca06e69462

  • SHA512

    a9f05bb5f4c9461d6afd9d5b360640e5eb1cc6d6d68ff008926a57af9028f36e29c050301de02e0579c7a366924bad39a3a410fea0f169540fd7ebecd9697a81

  • SSDEEP

    3072:GYIXMQbh2RpqgYiO9zUeZfYxX2aCFSQt:GzkpqRJ95QxxCEQt

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0b0e16446091afe9ea4d92adae9012751374903dccfbad426b3878ca06e69462

    • Size

      120KB

    • MD5

      4d3336ebcc7be71a5f2f27a3c6d321c3

    • SHA1

      a12915e0f44315770d5da99cb1f41284933ffcf4

    • SHA256

      0b0e16446091afe9ea4d92adae9012751374903dccfbad426b3878ca06e69462

    • SHA512

      a9f05bb5f4c9461d6afd9d5b360640e5eb1cc6d6d68ff008926a57af9028f36e29c050301de02e0579c7a366924bad39a3a410fea0f169540fd7ebecd9697a81

    • SSDEEP

      3072:GYIXMQbh2RpqgYiO9zUeZfYxX2aCFSQt:GzkpqRJ95QxxCEQt

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks