General

  • Target

    efd57058021b7765eda279f18c7d6fd996957b3a55638055a956a1d7d757b566

  • Size

    120KB

  • Sample

    241228-ewc1hsvrgv

  • MD5

    9b82742a7982e5566ccd71d27601cefc

  • SHA1

    cee59a8b6e0fe2ebd0ef94986af30c8865de6d9b

  • SHA256

    efd57058021b7765eda279f18c7d6fd996957b3a55638055a956a1d7d757b566

  • SHA512

    9cb3bf33719c54fc1361f20ecd7c4d9dede60cdf976a891f8992b8dc23200c2028740308b4793b1ba2d5de6303562b25c62eea65f94a0ac489b68fd31018fbcc

  • SSDEEP

    1536:UllswVuGrR4bFb31iv9HqEVviq/AuPGQYrp8y5V8Gg3tZ2+Itccj2d4ru/ibY:S2w9rR0biPV4mYrp8yj8GuImChu/i0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      efd57058021b7765eda279f18c7d6fd996957b3a55638055a956a1d7d757b566

    • Size

      120KB

    • MD5

      9b82742a7982e5566ccd71d27601cefc

    • SHA1

      cee59a8b6e0fe2ebd0ef94986af30c8865de6d9b

    • SHA256

      efd57058021b7765eda279f18c7d6fd996957b3a55638055a956a1d7d757b566

    • SHA512

      9cb3bf33719c54fc1361f20ecd7c4d9dede60cdf976a891f8992b8dc23200c2028740308b4793b1ba2d5de6303562b25c62eea65f94a0ac489b68fd31018fbcc

    • SSDEEP

      1536:UllswVuGrR4bFb31iv9HqEVviq/AuPGQYrp8y5V8Gg3tZ2+Itccj2d4ru/ibY:S2w9rR0biPV4mYrp8yj8GuImChu/i0

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks