General

  • Target

    ed955fc79ff86a0d61097e2c889a853e9d82f00028f829784c33bac97f51c094

  • Size

    734KB

  • Sample

    241224-ye4axsvpfx

  • MD5

    09528d18092d01ffd7b92c730dc6b496

  • SHA1

    cc6b55537db1c4643d9e0ff66a0ddadf1c35c17a

  • SHA256

    ed955fc79ff86a0d61097e2c889a853e9d82f00028f829784c33bac97f51c094

  • SHA512

    969e3bfc039ae97d143647017b51d1970a90acc39d287382167921e22876c05b5ae6ddb15c8355251f7dcd10aceef6a255155e7ac9acf8d2b5de12e12147afca

  • SSDEEP

    12288:E/5m0On2dE/3gtvgPA3elDyeR8wa2j49WjsnMikgdvRN4XfMIi0lTF7TxM///6kI:w02E/3gzWsnMp6ilJn2/nASJSfE7zvvy

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ed955fc79ff86a0d61097e2c889a853e9d82f00028f829784c33bac97f51c094

    • Size

      734KB

    • MD5

      09528d18092d01ffd7b92c730dc6b496

    • SHA1

      cc6b55537db1c4643d9e0ff66a0ddadf1c35c17a

    • SHA256

      ed955fc79ff86a0d61097e2c889a853e9d82f00028f829784c33bac97f51c094

    • SHA512

      969e3bfc039ae97d143647017b51d1970a90acc39d287382167921e22876c05b5ae6ddb15c8355251f7dcd10aceef6a255155e7ac9acf8d2b5de12e12147afca

    • SSDEEP

      12288:E/5m0On2dE/3gtvgPA3elDyeR8wa2j49WjsnMikgdvRN4XfMIi0lTF7TxM///6kI:w02E/3gzWsnMp6ilJn2/nASJSfE7zvvy

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks