General

  • Target

    f5b9c3a9189b4fc3e64cf2b9e3058ad4fcaa13c91ada2abb198c982d6254e9f1

  • Size

    65KB

  • Sample

    241228-e3v5nswmhm

  • MD5

    4bc40c316c1e68f95a8c5d1180f35788

  • SHA1

    9349c981f3997542a2dacf0fbc70a6fd7248d272

  • SHA256

    f5b9c3a9189b4fc3e64cf2b9e3058ad4fcaa13c91ada2abb198c982d6254e9f1

  • SHA512

    9fb3cd9d2be39d5e2d20f38c1139c1357e8cf73202a5a8d06255015342e0ade60c54e5518fe2099b02163f9ea57b7d4be03c8da379814253f9bbcce0958d1678

  • SSDEEP

    768:penS2pkYLFkMKkQDwFIDx8XjotsqLUgecNGPHDzceLbdTkSLTo/3VuRN42UlTcx:pISA3LFkMJT8LLUMYP3LbCSLcC4b2x

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      f5b9c3a9189b4fc3e64cf2b9e3058ad4fcaa13c91ada2abb198c982d6254e9f1

    • Size

      65KB

    • MD5

      4bc40c316c1e68f95a8c5d1180f35788

    • SHA1

      9349c981f3997542a2dacf0fbc70a6fd7248d272

    • SHA256

      f5b9c3a9189b4fc3e64cf2b9e3058ad4fcaa13c91ada2abb198c982d6254e9f1

    • SHA512

      9fb3cd9d2be39d5e2d20f38c1139c1357e8cf73202a5a8d06255015342e0ade60c54e5518fe2099b02163f9ea57b7d4be03c8da379814253f9bbcce0958d1678

    • SSDEEP

      768:penS2pkYLFkMKkQDwFIDx8XjotsqLUgecNGPHDzceLbdTkSLTo/3VuRN42UlTcx:pISA3LFkMJT8LLUMYP3LbCSLcC4b2x

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks