General

  • Target

    a1ecde2f2372953082121f9069c3604e2a2c3ddbc42db4d3f8e4bef94cb9195b

  • Size

    3.6MB

  • Sample

    241229-r4lc3stpay

  • MD5

    0be2df9013a5a65ea3f6cf27026da973

  • SHA1

    d3f5e40b8f1451c4b917f329b6361ecb44334804

  • SHA256

    a1ecde2f2372953082121f9069c3604e2a2c3ddbc42db4d3f8e4bef94cb9195b

  • SHA512

    a595ecbc646830b2472039e5133e256f912f4b5559d3880c7c4dcf400e32161472e6b6a3aa27a118341185d54ee05d11a6e0261234926a5cd2f1089b26664063

  • SSDEEP

    49152:3p+825FTbbSwry7b82ERsvpENnsH227LOcwGSE7mGXndShxntS+FS4uXTholSyYl:525FTbHVvavpQnsz7LOcwGRFShEHy8

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a1ecde2f2372953082121f9069c3604e2a2c3ddbc42db4d3f8e4bef94cb9195b

    • Size

      3.6MB

    • MD5

      0be2df9013a5a65ea3f6cf27026da973

    • SHA1

      d3f5e40b8f1451c4b917f329b6361ecb44334804

    • SHA256

      a1ecde2f2372953082121f9069c3604e2a2c3ddbc42db4d3f8e4bef94cb9195b

    • SHA512

      a595ecbc646830b2472039e5133e256f912f4b5559d3880c7c4dcf400e32161472e6b6a3aa27a118341185d54ee05d11a6e0261234926a5cd2f1089b26664063

    • SSDEEP

      49152:3p+825FTbbSwry7b82ERsvpENnsH227LOcwGSE7mGXndShxntS+FS4uXTholSyYl:525FTbHVvavpQnsz7LOcwGRFShEHy8

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks