General

  • Target

    6fd67a706e543f1124c0532392ff98acfe877e8d0e0f910258da52a17375e16d

  • Size

    65KB

  • Sample

    241229-a1r8saxkdp

  • MD5

    6d520041f77829c0a6354fe06a1f8164

  • SHA1

    c11f628908ff531ecc572ec377f7385c8c0fdb97

  • SHA256

    6fd67a706e543f1124c0532392ff98acfe877e8d0e0f910258da52a17375e16d

  • SHA512

    906fd843b120d2a001d626e4cdaa94ea5fc40fe3609d3ef8c70f88341efdc8fda244c3ec20e6b14755b70d45791692951c7cc3983bdcc854b847f93c5a83580e

  • SSDEEP

    1536:p8Jg+MKYdahghTLDJ/jGfiL2C9485D0MkZ9ZteEwFxs:p8J/MmgRDJ/SaLd5DY9Te/2

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      6fd67a706e543f1124c0532392ff98acfe877e8d0e0f910258da52a17375e16d

    • Size

      65KB

    • MD5

      6d520041f77829c0a6354fe06a1f8164

    • SHA1

      c11f628908ff531ecc572ec377f7385c8c0fdb97

    • SHA256

      6fd67a706e543f1124c0532392ff98acfe877e8d0e0f910258da52a17375e16d

    • SHA512

      906fd843b120d2a001d626e4cdaa94ea5fc40fe3609d3ef8c70f88341efdc8fda244c3ec20e6b14755b70d45791692951c7cc3983bdcc854b847f93c5a83580e

    • SSDEEP

      1536:p8Jg+MKYdahghTLDJ/jGfiL2C9485D0MkZ9ZteEwFxs:p8J/MmgRDJ/SaLd5DY9Te/2

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks