General

  • Target

    cd18690a8594cd13e1d77b31cd771052172d91255a1b348c9e913dda67e05edb

  • Size

    120KB

  • Sample

    241230-dvmb5awpgl

  • MD5

    fb194785098c1440aa1f0c623b851aa4

  • SHA1

    e107059524ef21ff8aa0b75d9dd212fb0e83e6c5

  • SHA256

    cd18690a8594cd13e1d77b31cd771052172d91255a1b348c9e913dda67e05edb

  • SHA512

    748d9158eb32e5b469c2629f3bcde56576ae82390a9e3e6862afaf3c9a856b1c51eb5f5cd426e87dc7a0d6f8be2b9f64d23dfd1a62b77b0627b79fd20b9f670a

  • SSDEEP

    3072:n4sGqjQ+GI5UqWYBbTlJeVX3E+uYxk4Hmh9z0K:AqHGmCYVl8t3EppN9zJ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      cd18690a8594cd13e1d77b31cd771052172d91255a1b348c9e913dda67e05edb

    • Size

      120KB

    • MD5

      fb194785098c1440aa1f0c623b851aa4

    • SHA1

      e107059524ef21ff8aa0b75d9dd212fb0e83e6c5

    • SHA256

      cd18690a8594cd13e1d77b31cd771052172d91255a1b348c9e913dda67e05edb

    • SHA512

      748d9158eb32e5b469c2629f3bcde56576ae82390a9e3e6862afaf3c9a856b1c51eb5f5cd426e87dc7a0d6f8be2b9f64d23dfd1a62b77b0627b79fd20b9f670a

    • SSDEEP

      3072:n4sGqjQ+GI5UqWYBbTlJeVX3E+uYxk4Hmh9z0K:AqHGmCYVl8t3EppN9zJ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks