General

  • Target

    f3e1468c4362208db9f715772f7acd38b3b8abb26169660ef99dbba3db51fa7f

  • Size

    65KB

  • Sample

    241224-dddzeszqdn

  • MD5

    9b9bd34912e3386af3e83eafa4dfe49d

  • SHA1

    61ad02eb6b3098df4d820aac604cf87125db3c14

  • SHA256

    f3e1468c4362208db9f715772f7acd38b3b8abb26169660ef99dbba3db51fa7f

  • SHA512

    4a87d306a38f8f7c2a13af30f9c3bda329e2e52e2bf15c6424743fdab9000d389959dc0554b725f317b469d8dac1b5acbfcfda06840115e4e1642385d970e0e9

  • SSDEEP

    1536:mw74bfBoWLPQ5hoIuwUBRgn8y87j3RhSW1wEzAafrOURT52cvN1:KbfBoZZfUDlj3LrRf/BQe1

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      f3e1468c4362208db9f715772f7acd38b3b8abb26169660ef99dbba3db51fa7f

    • Size

      65KB

    • MD5

      9b9bd34912e3386af3e83eafa4dfe49d

    • SHA1

      61ad02eb6b3098df4d820aac604cf87125db3c14

    • SHA256

      f3e1468c4362208db9f715772f7acd38b3b8abb26169660ef99dbba3db51fa7f

    • SHA512

      4a87d306a38f8f7c2a13af30f9c3bda329e2e52e2bf15c6424743fdab9000d389959dc0554b725f317b469d8dac1b5acbfcfda06840115e4e1642385d970e0e9

    • SSDEEP

      1536:mw74bfBoWLPQ5hoIuwUBRgn8y87j3RhSW1wEzAafrOURT52cvN1:KbfBoZZfUDlj3LrRf/BQe1

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks