General

  • Target

    383c0bcc1c1d5b74b6279a02c22b54cf3e3c9878b75ba809a323dde854d147b4

  • Size

    65KB

  • Sample

    241224-z3z4vaxnct

  • MD5

    44cf2867986866ae830b1a24e4794d09

  • SHA1

    832fd9731881a25a82b6597978c8b54553505f13

  • SHA256

    383c0bcc1c1d5b74b6279a02c22b54cf3e3c9878b75ba809a323dde854d147b4

  • SHA512

    cf359a20855a119b27b4b35b0124e09a8fcec73b3182e275dedaa3d17e5824deb8dd2c05beb8eaf4763f3504fb8b130a20d23aad9470e201f8b3427f4246dc48

  • SSDEEP

    1536:8TazZfbOERfvv5e/56k/4Vj9YZwWJwr2Bq906YsTOlxL9QG:xZVRh0skAT4VMydlh9QG

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      383c0bcc1c1d5b74b6279a02c22b54cf3e3c9878b75ba809a323dde854d147b4

    • Size

      65KB

    • MD5

      44cf2867986866ae830b1a24e4794d09

    • SHA1

      832fd9731881a25a82b6597978c8b54553505f13

    • SHA256

      383c0bcc1c1d5b74b6279a02c22b54cf3e3c9878b75ba809a323dde854d147b4

    • SHA512

      cf359a20855a119b27b4b35b0124e09a8fcec73b3182e275dedaa3d17e5824deb8dd2c05beb8eaf4763f3504fb8b130a20d23aad9470e201f8b3427f4246dc48

    • SSDEEP

      1536:8TazZfbOERfvv5e/56k/4Vj9YZwWJwr2Bq906YsTOlxL9QG:xZVRh0skAT4VMydlh9QG

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks