General

  • Target

    0c91a239ba59314831aa89ac1a1e1f81cf297747e85b76c21389ef9ed5ed3602

  • Size

    2.5MB

  • Sample

    241220-g82krasjc1

  • MD5

    1cbd4f5806f4b8c17ddde1314df6b372

  • SHA1

    ca99538315ad497ada98463751938d50c1b6d4f2

  • SHA256

    0c91a239ba59314831aa89ac1a1e1f81cf297747e85b76c21389ef9ed5ed3602

  • SHA512

    9878e9bb9b461562a9cc18678eebadde7d4c1493feb433bbb76db21519789861a693318e5facdd36bd0e9e720864e1df79418a454caa782d2ccd108d5d00a4ba

  • SSDEEP

    49152:42+dyVZZEv0TgIMOnXeHsaTYVf2jyZ6xsB3XPML51eZZCGt/4UlF0:4fwVZZEvGguuMR2jyFBkL5kW

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0c91a239ba59314831aa89ac1a1e1f81cf297747e85b76c21389ef9ed5ed3602

    • Size

      2.5MB

    • MD5

      1cbd4f5806f4b8c17ddde1314df6b372

    • SHA1

      ca99538315ad497ada98463751938d50c1b6d4f2

    • SHA256

      0c91a239ba59314831aa89ac1a1e1f81cf297747e85b76c21389ef9ed5ed3602

    • SHA512

      9878e9bb9b461562a9cc18678eebadde7d4c1493feb433bbb76db21519789861a693318e5facdd36bd0e9e720864e1df79418a454caa782d2ccd108d5d00a4ba

    • SSDEEP

      49152:42+dyVZZEv0TgIMOnXeHsaTYVf2jyZ6xsB3XPML51eZZCGt/4UlF0:4fwVZZEvGguuMR2jyFBkL5kW

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks