General

  • Target

    1d71878a266c4a25bf931119ff965e95839ffdf6e90f06e5123dfc0a615212c2

  • Size

    120KB

  • Sample

    241226-y27a4aykgm

  • MD5

    dfe99f01b1fbfbfce89949463ead8e19

  • SHA1

    4c2d382b786ce9d1b245dad367a3297ec90de3f9

  • SHA256

    1d71878a266c4a25bf931119ff965e95839ffdf6e90f06e5123dfc0a615212c2

  • SHA512

    07ecdd3b4451dc98e716479d44ff4ee5dc328d3ba5648559498ddbb0fa15f8b450ccf4496281691032dfd13b57899579753e592fce8070f0454afdb223d1dcb0

  • SSDEEP

    1536:KaAsFvnQzuVVPoDQin068M5jq5ZJy2EL0I6JHe0Et6LrfEy7n27kX2YCXFbWoFTJ:KCKz0684jq5ZJFEAV/tQyrX0xWI

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1d71878a266c4a25bf931119ff965e95839ffdf6e90f06e5123dfc0a615212c2

    • Size

      120KB

    • MD5

      dfe99f01b1fbfbfce89949463ead8e19

    • SHA1

      4c2d382b786ce9d1b245dad367a3297ec90de3f9

    • SHA256

      1d71878a266c4a25bf931119ff965e95839ffdf6e90f06e5123dfc0a615212c2

    • SHA512

      07ecdd3b4451dc98e716479d44ff4ee5dc328d3ba5648559498ddbb0fa15f8b450ccf4496281691032dfd13b57899579753e592fce8070f0454afdb223d1dcb0

    • SSDEEP

      1536:KaAsFvnQzuVVPoDQin068M5jq5ZJy2EL0I6JHe0Et6LrfEy7n27kX2YCXFbWoFTJ:KCKz0684jq5ZJFEAV/tQyrX0xWI

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks