General

  • Target

    8c84d1c8749d8e96ca483f777850eb7e4dfc982b7747fd0f0762658d4e50df87

  • Size

    120KB

  • Sample

    250101-a13phsxqe1

  • MD5

    aa9c8935b98c0fe6f840c94d110bbcee

  • SHA1

    2c973b90f87688c3183c74394b29ea10c6ccf7b2

  • SHA256

    8c84d1c8749d8e96ca483f777850eb7e4dfc982b7747fd0f0762658d4e50df87

  • SHA512

    39597f4375af2a5f5232bbb65bb84fada6fa01d3762df397a480340497469ea5bf5c0fd021b2895226fa53ce83871f05ff696c565437efdc8b011ccf2bc35745

  • SSDEEP

    3072:Grx8Jy/gxY37GXWMs4LPZCdEpVHsO1UD6qCbjHG9:Grx6y/trGXWMs4LIduMO1u6q39

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8c84d1c8749d8e96ca483f777850eb7e4dfc982b7747fd0f0762658d4e50df87

    • Size

      120KB

    • MD5

      aa9c8935b98c0fe6f840c94d110bbcee

    • SHA1

      2c973b90f87688c3183c74394b29ea10c6ccf7b2

    • SHA256

      8c84d1c8749d8e96ca483f777850eb7e4dfc982b7747fd0f0762658d4e50df87

    • SHA512

      39597f4375af2a5f5232bbb65bb84fada6fa01d3762df397a480340497469ea5bf5c0fd021b2895226fa53ce83871f05ff696c565437efdc8b011ccf2bc35745

    • SSDEEP

      3072:Grx8Jy/gxY37GXWMs4LPZCdEpVHsO1UD6qCbjHG9:Grx6y/trGXWMs4LIduMO1u6q39

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks