General

  • Target

    6fd8aa7240b5ac7871598b4b3619a8f73262d94513603b38dd9523294637b7b7

  • Size

    120KB

  • Sample

    241220-bm4kbswlfr

  • MD5

    69ea2880a13566a276199db0d11f0838

  • SHA1

    c57e8abb5eb304d90cde39d2ff1739819788be16

  • SHA256

    6fd8aa7240b5ac7871598b4b3619a8f73262d94513603b38dd9523294637b7b7

  • SHA512

    f2bf545266db4bfaad72725bf305cc411c1e9a1e11774f8766611cffba91b4d61c037a6401745665e0e26c566a39e1678a70fa185a3f951bb54dcf5ba68aca45

  • SSDEEP

    1536:LYqHOpkotPL0TAEkuopNquAYRmoetCaAYTmWfn7Kfw4ND6YyzNCNi7O2jX06SQ:LJupkoFRzuwouAdoe37+wMDhw0g

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      6fd8aa7240b5ac7871598b4b3619a8f73262d94513603b38dd9523294637b7b7

    • Size

      120KB

    • MD5

      69ea2880a13566a276199db0d11f0838

    • SHA1

      c57e8abb5eb304d90cde39d2ff1739819788be16

    • SHA256

      6fd8aa7240b5ac7871598b4b3619a8f73262d94513603b38dd9523294637b7b7

    • SHA512

      f2bf545266db4bfaad72725bf305cc411c1e9a1e11774f8766611cffba91b4d61c037a6401745665e0e26c566a39e1678a70fa185a3f951bb54dcf5ba68aca45

    • SSDEEP

      1536:LYqHOpkotPL0TAEkuopNquAYRmoetCaAYTmWfn7Kfw4ND6YyzNCNi7O2jX06SQ:LJupkoFRzuwouAdoe37+wMDhw0g

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks