General

  • Target

    fb9999fc1c6210ef254ab429d9d784e2f8d11c17c137a9070d7376230344efdb

  • Size

    732KB

  • Sample

    241229-g65jmavpct

  • MD5

    dd5a9505a1c9153669b3c9e2462bcc0c

  • SHA1

    73340eb5d3961d4cfacdd8f3475017ebb337abf7

  • SHA256

    fb9999fc1c6210ef254ab429d9d784e2f8d11c17c137a9070d7376230344efdb

  • SHA512

    4c18a28fa1fb18e2c7dd11c3af49e42eae31f7a70b183cf33640780851754700dd0a80d077946ecb43a1dda16437baee320cc5f6550f7fdb7d3c81ac76552d79

  • SSDEEP

    12288:xTyjXW+48qWywrU4kGFezOAVuJ5PIfww7F5DO3HYffVhp5G:1IXW/8yw1ez54lIjF5SXYHVhHG

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      fb9999fc1c6210ef254ab429d9d784e2f8d11c17c137a9070d7376230344efdb

    • Size

      732KB

    • MD5

      dd5a9505a1c9153669b3c9e2462bcc0c

    • SHA1

      73340eb5d3961d4cfacdd8f3475017ebb337abf7

    • SHA256

      fb9999fc1c6210ef254ab429d9d784e2f8d11c17c137a9070d7376230344efdb

    • SHA512

      4c18a28fa1fb18e2c7dd11c3af49e42eae31f7a70b183cf33640780851754700dd0a80d077946ecb43a1dda16437baee320cc5f6550f7fdb7d3c81ac76552d79

    • SSDEEP

      12288:xTyjXW+48qWywrU4kGFezOAVuJ5PIfww7F5DO3HYffVhp5G:1IXW/8yw1ez54lIjF5SXYHVhHG

    • Modifies firewall policy service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks