General

  • Target

    468379dcc66bb1a04f0260b63c8817948b5fcb6c1b008faa2fa62c080893470e

  • Size

    120KB

  • Sample

    241220-3qh7caxmer

  • MD5

    0f579acab2ea583ad8570e66ecf4ebb1

  • SHA1

    f0920b7cda926e9d6e8523a079be346640fd8b7b

  • SHA256

    468379dcc66bb1a04f0260b63c8817948b5fcb6c1b008faa2fa62c080893470e

  • SHA512

    07d9d9988c89dfe662c3fbb1f01910f076a6abfa00f759c5c97b311a90cd0399436d1a106b94f1fab2e11fcfb6a700cab105d341b26b931db9af00b342c4d443

  • SSDEEP

    3072:uCqgNr9CnbEoMzkj/9gl9O64MOxXZToIW4QHwx5:ZqyMVMzkj/OjOWMXKIWnQP

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      468379dcc66bb1a04f0260b63c8817948b5fcb6c1b008faa2fa62c080893470e

    • Size

      120KB

    • MD5

      0f579acab2ea583ad8570e66ecf4ebb1

    • SHA1

      f0920b7cda926e9d6e8523a079be346640fd8b7b

    • SHA256

      468379dcc66bb1a04f0260b63c8817948b5fcb6c1b008faa2fa62c080893470e

    • SHA512

      07d9d9988c89dfe662c3fbb1f01910f076a6abfa00f759c5c97b311a90cd0399436d1a106b94f1fab2e11fcfb6a700cab105d341b26b931db9af00b342c4d443

    • SSDEEP

      3072:uCqgNr9CnbEoMzkj/9gl9O64MOxXZToIW4QHwx5:ZqyMVMzkj/OjOWMXKIWnQP

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks