General

  • Target

    051ee83bd3128d790befa2b3fd9bd980N.exe

  • Size

    65KB

  • Sample

    240727-1j3ajazflm

  • MD5

    051ee83bd3128d790befa2b3fd9bd980

  • SHA1

    23a626ec7e2a32d16162be65194113ba6539355b

  • SHA256

    91aab5428cc3ecf4246e78810844d3bf78dc10dac75e33ecd731af7fadfec6a0

  • SHA512

    32ee02ef2605594e02aff2612f88727631f00d81b1da6cdc853ac50bd887d538b3fc40b770152f915e597261b1b93ea2d74e8106ce440cc539e26d83f3b51eca

  • SSDEEP

    1536:xfRmIdRMqGiUzjpRXZEbpVHRdqSk7kbQzZLxxsQoa1mb651EaAfNZ:x53aiUnpxKbpVxwSWkmZNeQo6ef3

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      051ee83bd3128d790befa2b3fd9bd980N.exe

    • Size

      65KB

    • MD5

      051ee83bd3128d790befa2b3fd9bd980

    • SHA1

      23a626ec7e2a32d16162be65194113ba6539355b

    • SHA256

      91aab5428cc3ecf4246e78810844d3bf78dc10dac75e33ecd731af7fadfec6a0

    • SHA512

      32ee02ef2605594e02aff2612f88727631f00d81b1da6cdc853ac50bd887d538b3fc40b770152f915e597261b1b93ea2d74e8106ce440cc539e26d83f3b51eca

    • SSDEEP

      1536:xfRmIdRMqGiUzjpRXZEbpVHRdqSk7kbQzZLxxsQoa1mb651EaAfNZ:x53aiUnpxKbpVxwSWkmZNeQo6ef3

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks