General

  • Target

    9fc1af6f8b8e8c3c2c857498dd96f5b4bda7d4b70fb69a8da6c5d3c4420a99ee

  • Size

    120KB

  • Sample

    241220-fbx1ma1ken

  • MD5

    fb7c28093cd2e889cd088e879d23144b

  • SHA1

    c6f6a3d4c3058bacc50b7dab17ebb1c48cef6b91

  • SHA256

    9fc1af6f8b8e8c3c2c857498dd96f5b4bda7d4b70fb69a8da6c5d3c4420a99ee

  • SHA512

    4244c7cc42f18d3f1e2e3a72027aa7403e71bffbb2a2157cd00590949e19b4b66f50ad1bf034d3a0d5ee4bb264d7314f0e0b964a3ace094e8ed4f7e573edf333

  • SSDEEP

    3072:znDNQq+K2zQNRxpvB8LjLj6Uo0DX6GVA1kbUD:zn2XXzmztBWDs02N1SU

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      9fc1af6f8b8e8c3c2c857498dd96f5b4bda7d4b70fb69a8da6c5d3c4420a99ee

    • Size

      120KB

    • MD5

      fb7c28093cd2e889cd088e879d23144b

    • SHA1

      c6f6a3d4c3058bacc50b7dab17ebb1c48cef6b91

    • SHA256

      9fc1af6f8b8e8c3c2c857498dd96f5b4bda7d4b70fb69a8da6c5d3c4420a99ee

    • SHA512

      4244c7cc42f18d3f1e2e3a72027aa7403e71bffbb2a2157cd00590949e19b4b66f50ad1bf034d3a0d5ee4bb264d7314f0e0b964a3ace094e8ed4f7e573edf333

    • SSDEEP

      3072:znDNQq+K2zQNRxpvB8LjLj6Uo0DX6GVA1kbUD:zn2XXzmztBWDs02N1SU

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks