General

  • Target

    d21ef9b9e3108d423986d25d7b57a12c92a73f1eb12bb97d69527bc6498e7310

  • Size

    1.8MB

  • Sample

    241226-hmthpazjfq

  • MD5

    2f8a13162eab843058da0f2a34c59b1a

  • SHA1

    8bf5405313cfd9b18674c6dd2d5002087b0d9010

  • SHA256

    d21ef9b9e3108d423986d25d7b57a12c92a73f1eb12bb97d69527bc6498e7310

  • SHA512

    c9ccace7c86e59161e9ef94d0acd7aab24697b5536e405e09104e79a15d8416598a557511e62e91ef815ac7e3d43bf1599b0724cb530235d342b06cfbe3b1d56

  • SSDEEP

    49152:GiEa3J/lPA552bT8TCKpxVt2sl0TD5yncADYOS0jZ2/vgm9dEcQGWoZmFxu:GizIOoT9pnt9l45mcADRS0SRbqGzZmFA

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d21ef9b9e3108d423986d25d7b57a12c92a73f1eb12bb97d69527bc6498e7310

    • Size

      1.8MB

    • MD5

      2f8a13162eab843058da0f2a34c59b1a

    • SHA1

      8bf5405313cfd9b18674c6dd2d5002087b0d9010

    • SHA256

      d21ef9b9e3108d423986d25d7b57a12c92a73f1eb12bb97d69527bc6498e7310

    • SHA512

      c9ccace7c86e59161e9ef94d0acd7aab24697b5536e405e09104e79a15d8416598a557511e62e91ef815ac7e3d43bf1599b0724cb530235d342b06cfbe3b1d56

    • SSDEEP

      49152:GiEa3J/lPA552bT8TCKpxVt2sl0TD5yncADYOS0jZ2/vgm9dEcQGWoZmFxu:GizIOoT9pnt9l45mcADRS0SRbqGzZmFA

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks