General

  • Target

    e7e4f9b338f634e9818ab8ccb1a12e30N.exe

  • Size

    120KB

  • Sample

    240813-wh8cyasfnj

  • MD5

    e7e4f9b338f634e9818ab8ccb1a12e30

  • SHA1

    e6e0402f372aca08e7fa6552c3e4bebad361f161

  • SHA256

    5b2867a6400555f776c50def66004cf71857d35cb3b4d0371f20c2898ba6c68a

  • SHA512

    6c4225af7beca3fccb3ec90a6d179836517c8c438c6bae977fb6069d86892b963247db279ef25d7cd32e9d483c3f8ca76d8a79dfcfbc892df3ba84ad44413635

  • SSDEEP

    3072:pd34at33rkhErWdQXyTyEdQ5RDaO1PHPUzB:Doa17eEi5wlHPO

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e7e4f9b338f634e9818ab8ccb1a12e30N.exe

    • Size

      120KB

    • MD5

      e7e4f9b338f634e9818ab8ccb1a12e30

    • SHA1

      e6e0402f372aca08e7fa6552c3e4bebad361f161

    • SHA256

      5b2867a6400555f776c50def66004cf71857d35cb3b4d0371f20c2898ba6c68a

    • SHA512

      6c4225af7beca3fccb3ec90a6d179836517c8c438c6bae977fb6069d86892b963247db279ef25d7cd32e9d483c3f8ca76d8a79dfcfbc892df3ba84ad44413635

    • SSDEEP

      3072:pd34at33rkhErWdQXyTyEdQ5RDaO1PHPUzB:Doa17eEi5wlHPO

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks