General

  • Target

    504ce0b8ce800908fa9cbf45891193ea53d69e82a91075e44cbabf97c67a4a04

  • Size

    585KB

  • Sample

    241227-1vdrba1jat

  • MD5

    aaf187a9a44f4c6da491802c6d3a0dac

  • SHA1

    394c07c73b3716ae44a384ee9111d9382cc1ea77

  • SHA256

    504ce0b8ce800908fa9cbf45891193ea53d69e82a91075e44cbabf97c67a4a04

  • SHA512

    f06be0a329598007ea34f974f534f4f11cbe16143117b4adce27c1b84bb948c958b35b35ca3ff83387edfa7138b6d210393bdbe7b0f63acad36b975ea179c775

  • SSDEEP

    12288:mrMIztyCK5x8CBmn+RrNbEyWYa0Ie1vUxsVOmo8m5DVG:MZyCA8CBmn+RrNj9ay5tOmUDVG

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      504ce0b8ce800908fa9cbf45891193ea53d69e82a91075e44cbabf97c67a4a04

    • Size

      585KB

    • MD5

      aaf187a9a44f4c6da491802c6d3a0dac

    • SHA1

      394c07c73b3716ae44a384ee9111d9382cc1ea77

    • SHA256

      504ce0b8ce800908fa9cbf45891193ea53d69e82a91075e44cbabf97c67a4a04

    • SHA512

      f06be0a329598007ea34f974f534f4f11cbe16143117b4adce27c1b84bb948c958b35b35ca3ff83387edfa7138b6d210393bdbe7b0f63acad36b975ea179c775

    • SSDEEP

      12288:mrMIztyCK5x8CBmn+RrNbEyWYa0Ie1vUxsVOmo8m5DVG:MZyCA8CBmn+RrNj9ay5tOmUDVG

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks