General

  • Target

    b3320f1c2469f20857cc45d513af56a8bfb4fc6167ab20e16bc9e4860b458149

  • Size

    65KB

  • Sample

    241220-gnn4xsslck

  • MD5

    765266b321ff890624a4a91bff92ea15

  • SHA1

    2e34128292b220a30fdd4755327af045be99fca9

  • SHA256

    b3320f1c2469f20857cc45d513af56a8bfb4fc6167ab20e16bc9e4860b458149

  • SHA512

    dc25c05e0700ee1f467df04eac037c85796acd9a1e6dba7e2be03593a38b1ff1d37f10e925ac1dbf05c03437b62e657128de8809b9b6cb2a06fc0745257565fd

  • SSDEEP

    1536:563V/mgvX6bBiSxFz/5jVHTMyeO7YtWwneq3HvRHB2ebMU7pgnn+Uq:CV/mgirH2ye3eI5HBFbj7pg+Uq

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      b3320f1c2469f20857cc45d513af56a8bfb4fc6167ab20e16bc9e4860b458149

    • Size

      65KB

    • MD5

      765266b321ff890624a4a91bff92ea15

    • SHA1

      2e34128292b220a30fdd4755327af045be99fca9

    • SHA256

      b3320f1c2469f20857cc45d513af56a8bfb4fc6167ab20e16bc9e4860b458149

    • SHA512

      dc25c05e0700ee1f467df04eac037c85796acd9a1e6dba7e2be03593a38b1ff1d37f10e925ac1dbf05c03437b62e657128de8809b9b6cb2a06fc0745257565fd

    • SSDEEP

      1536:563V/mgvX6bBiSxFz/5jVHTMyeO7YtWwneq3HvRHB2ebMU7pgnn+Uq:CV/mgirH2ye3eI5HBFbj7pg+Uq

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks