General

  • Target

    191939b1abf0699f75e05e0b66cbf440c0f1e52f943295fe235a7a8da168bc98

  • Size

    120KB

  • Sample

    241222-ywwx6sxmgx

  • MD5

    f4cf9357e33cff6728cc7a13e5abfd11

  • SHA1

    1bd6a7c6313962363031641aa64ad27d142c76df

  • SHA256

    191939b1abf0699f75e05e0b66cbf440c0f1e52f943295fe235a7a8da168bc98

  • SHA512

    dbea9ac3f3b74225b812dc74aec38c7acc511fb76f008937e7a7f5aeb8c5f4d1dfedd5d6497d4ccfc4a12cb864e214d48703434563db6bb87043bc33054382d2

  • SSDEEP

    1536:skGQ2bUozt646GLLAHLK2pQnnMFeI9fLZD/9PYi2FMZnEo2P36:jGpz5L8LKi3jZWinOP

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      191939b1abf0699f75e05e0b66cbf440c0f1e52f943295fe235a7a8da168bc98

    • Size

      120KB

    • MD5

      f4cf9357e33cff6728cc7a13e5abfd11

    • SHA1

      1bd6a7c6313962363031641aa64ad27d142c76df

    • SHA256

      191939b1abf0699f75e05e0b66cbf440c0f1e52f943295fe235a7a8da168bc98

    • SHA512

      dbea9ac3f3b74225b812dc74aec38c7acc511fb76f008937e7a7f5aeb8c5f4d1dfedd5d6497d4ccfc4a12cb864e214d48703434563db6bb87043bc33054382d2

    • SSDEEP

      1536:skGQ2bUozt646GLLAHLK2pQnnMFeI9fLZD/9PYi2FMZnEo2P36:jGpz5L8LKi3jZWinOP

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks