General

  • Target

    8d84578a58e01bbfa12db4c888b1f01a9b3932c4e3b9a79c4db99193c3de24e0

  • Size

    120KB

  • Sample

    241221-cvy59aznex

  • MD5

    d958bb5131c9a2d15dca5a61cd68c327

  • SHA1

    11aaa06539ce20ff6b76c057d754c0c0246451ee

  • SHA256

    8d84578a58e01bbfa12db4c888b1f01a9b3932c4e3b9a79c4db99193c3de24e0

  • SHA512

    162d5fca7dcba87e3d28efcbf2070168141176207c51f4697af7008779011bd595769ade6d98539c6dd528757c313ee3f7573643dba9af17e0adbc1fe59534fe

  • SSDEEP

    1536:ONSqMf2cyi5YCZ40IVL7C49cOlg6oowismbeAODjkMoMoi+I79:RfF406L7CacOlg6MiPexYMoMB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8d84578a58e01bbfa12db4c888b1f01a9b3932c4e3b9a79c4db99193c3de24e0

    • Size

      120KB

    • MD5

      d958bb5131c9a2d15dca5a61cd68c327

    • SHA1

      11aaa06539ce20ff6b76c057d754c0c0246451ee

    • SHA256

      8d84578a58e01bbfa12db4c888b1f01a9b3932c4e3b9a79c4db99193c3de24e0

    • SHA512

      162d5fca7dcba87e3d28efcbf2070168141176207c51f4697af7008779011bd595769ade6d98539c6dd528757c313ee3f7573643dba9af17e0adbc1fe59534fe

    • SSDEEP

      1536:ONSqMf2cyi5YCZ40IVL7C49cOlg6oowismbeAODjkMoMoi+I79:RfF406L7CacOlg6MiPexYMoMB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks