General

  • Target

    cd633d10c458f0ff95547c25c3a125a93bd9dd2d73cf64d2cfedeaabc8aa58bc

  • Size

    97KB

  • Sample

    241225-dc37xswjfl

  • MD5

    d8239c5653f93dee6cfc5b4b1ad53497

  • SHA1

    2e4fde2c2f5fdcdaa76336a6f31c85d9e5007836

  • SHA256

    cd633d10c458f0ff95547c25c3a125a93bd9dd2d73cf64d2cfedeaabc8aa58bc

  • SHA512

    690b28a77beb50ce8abe83943e0e90927c576d853fc11902d18a4ea6d717f534f2a531c035fccb91651986cde3ce11e3826a25103f64f1e2190c7c46afa70def

  • SSDEEP

    1536:PzQ31l7hXtLdHuKhcNTmifPrL0FuT6FJ0NePunOu:PU31lh3OGyTmirAE6LsePuOu

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      cd633d10c458f0ff95547c25c3a125a93bd9dd2d73cf64d2cfedeaabc8aa58bc

    • Size

      97KB

    • MD5

      d8239c5653f93dee6cfc5b4b1ad53497

    • SHA1

      2e4fde2c2f5fdcdaa76336a6f31c85d9e5007836

    • SHA256

      cd633d10c458f0ff95547c25c3a125a93bd9dd2d73cf64d2cfedeaabc8aa58bc

    • SHA512

      690b28a77beb50ce8abe83943e0e90927c576d853fc11902d18a4ea6d717f534f2a531c035fccb91651986cde3ce11e3826a25103f64f1e2190c7c46afa70def

    • SSDEEP

      1536:PzQ31l7hXtLdHuKhcNTmifPrL0FuT6FJ0NePunOu:PU31lh3OGyTmirAE6LsePuOu

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks