General

  • Target

    4255bf0704149083970ff733748d3fb8c62035d4c8317716d6f4b0897fc958c3

  • Size

    3.5MB

  • Sample

    241227-s4x8bawrgq

  • MD5

    ed89a1c31aec51d2f9469020a030cf9d

  • SHA1

    be0bd2ff44b9a4c1731621947ddb1a5c4297dbc7

  • SHA256

    4255bf0704149083970ff733748d3fb8c62035d4c8317716d6f4b0897fc958c3

  • SHA512

    9f83707c4d6a30f9355ca439da4c38f4c9501f3e0a7e3f6a4df535a15bd5151cc9847ed76f3e0133d185ccfdcbeac02e92c6f64ba473117928e3bb348c557f08

  • SSDEEP

    49152:xYI2/kVFVFCzKgP+s8KuqGaX0ToIBAUZLYbWy0Af1F9:t2kVbcWgkJBAUZLDA1

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      4255bf0704149083970ff733748d3fb8c62035d4c8317716d6f4b0897fc958c3

    • Size

      3.5MB

    • MD5

      ed89a1c31aec51d2f9469020a030cf9d

    • SHA1

      be0bd2ff44b9a4c1731621947ddb1a5c4297dbc7

    • SHA256

      4255bf0704149083970ff733748d3fb8c62035d4c8317716d6f4b0897fc958c3

    • SHA512

      9f83707c4d6a30f9355ca439da4c38f4c9501f3e0a7e3f6a4df535a15bd5151cc9847ed76f3e0133d185ccfdcbeac02e92c6f64ba473117928e3bb348c557f08

    • SSDEEP

      49152:xYI2/kVFVFCzKgP+s8KuqGaX0ToIBAUZLYbWy0Af1F9:t2kVbcWgkJBAUZLDA1

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks