General

  • Target

    881d3f10ec8570a583ab2ce4775fa620N.exe

  • Size

    120KB

  • Sample

    240821-bl7wcswglq

  • MD5

    881d3f10ec8570a583ab2ce4775fa620

  • SHA1

    708862fd7da2d2cda4b7f2b102a61b60e5242fbc

  • SHA256

    dd3ef7e26ccc521c32c715a022fd809070c32667dc49dbc24578a5fd511c0f0b

  • SHA512

    1467d6640c0b7c3018d0ad3997c363cbf16380a1b3a339a26974efe3c848e7060ba7f451156ccf6aade78804bf453826cc9871f3c433618428da962cbf775402

  • SSDEEP

    1536:+lwW1TXsuTQOLUdpqXkxS577ZhWw3p8hO1DtI6zZEu2DkhoKHznhhJZ6WXkj9hnB:+yW1I24dcSwdRahmI6SuKTMFhmWXAH

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      881d3f10ec8570a583ab2ce4775fa620N.exe

    • Size

      120KB

    • MD5

      881d3f10ec8570a583ab2ce4775fa620

    • SHA1

      708862fd7da2d2cda4b7f2b102a61b60e5242fbc

    • SHA256

      dd3ef7e26ccc521c32c715a022fd809070c32667dc49dbc24578a5fd511c0f0b

    • SHA512

      1467d6640c0b7c3018d0ad3997c363cbf16380a1b3a339a26974efe3c848e7060ba7f451156ccf6aade78804bf453826cc9871f3c433618428da962cbf775402

    • SSDEEP

      1536:+lwW1TXsuTQOLUdpqXkxS577ZhWw3p8hO1DtI6zZEu2DkhoKHznhhJZ6WXkj9hnB:+yW1I24dcSwdRahmI6SuKTMFhmWXAH

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks