General

  • Target

    0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea

  • Size

    3.4MB

  • Sample

    250206-gtrf8svmdz

  • MD5

    5a44d55977279dea261cbad06f84d66f

  • SHA1

    022593b1487db6544d4d179698b8e618aea1ce53

  • SHA256

    0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea

  • SHA512

    7aab6db7bbaf2c8138d00587ade4df87ec4d9ebea40c0cbafaba04fc4510062112c1ae91abcdd6fa522bb3c3dab68cd4e4cb3ad7b8e07f972b1b38f23226e6dc

  • SSDEEP

    98304:LQOH5ra31GoHKqUifIwY/L4a3X62BcFOg/9MRhM6+bajaQPl:LHMBHKqUaS/LO2BM9MDMFfQPl

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea

    • Size

      3.4MB

    • MD5

      5a44d55977279dea261cbad06f84d66f

    • SHA1

      022593b1487db6544d4d179698b8e618aea1ce53

    • SHA256

      0bf1707f0190e2ab72e3fbe57212ff433b0d5a9ef5403ff493cbebdc1f734aea

    • SHA512

      7aab6db7bbaf2c8138d00587ade4df87ec4d9ebea40c0cbafaba04fc4510062112c1ae91abcdd6fa522bb3c3dab68cd4e4cb3ad7b8e07f972b1b38f23226e6dc

    • SSDEEP

      98304:LQOH5ra31GoHKqUifIwY/L4a3X62BcFOg/9MRhM6+bajaQPl:LHMBHKqUaS/LO2BM9MDMFfQPl

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks