General

  • Target

    583b48afb45054b04244ef0b97f2d979c1d6f13b44dbad6aee6d1cacb1d624da

  • Size

    120KB

  • Sample

    241231-2m37nswjdp

  • MD5

    1c78564479a646e552dedbf44511c3d8

  • SHA1

    9e0c6a5d80d53a60ad1857c97789e2b9db011b91

  • SHA256

    583b48afb45054b04244ef0b97f2d979c1d6f13b44dbad6aee6d1cacb1d624da

  • SHA512

    5bdc6c51251be25b6eb1614117828e2f321f5a0a2dc6847746443edac6c27bbc9f0eb2b025ed99706b118367e10bebd82226e5028a51ab2f164f0b1037dd41b5

  • SSDEEP

    3072:WgRZKQXThHls4DgorSFEjfN46dZ3MVNuzn:W+Km1Hls4vrDPGw

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      583b48afb45054b04244ef0b97f2d979c1d6f13b44dbad6aee6d1cacb1d624da

    • Size

      120KB

    • MD5

      1c78564479a646e552dedbf44511c3d8

    • SHA1

      9e0c6a5d80d53a60ad1857c97789e2b9db011b91

    • SHA256

      583b48afb45054b04244ef0b97f2d979c1d6f13b44dbad6aee6d1cacb1d624da

    • SHA512

      5bdc6c51251be25b6eb1614117828e2f321f5a0a2dc6847746443edac6c27bbc9f0eb2b025ed99706b118367e10bebd82226e5028a51ab2f164f0b1037dd41b5

    • SSDEEP

      3072:WgRZKQXThHls4DgorSFEjfN46dZ3MVNuzn:W+Km1Hls4vrDPGw

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks