General

  • Target

    d605374590e3fab70ebd17c673dd4c40N.exe

  • Size

    120KB

  • Sample

    240821-ewbgpatblr

  • MD5

    d605374590e3fab70ebd17c673dd4c40

  • SHA1

    c309527d05f084ba51b4356f315e2c17527d945e

  • SHA256

    c40dc500009e2134d67477fe7f4ae1f77b11b2a6a3c4f4f57c2e3518878af6d7

  • SHA512

    cc16517e40c9a2933ded8af4cde24bffe27770cd06def149e8f5b4e33985b833026091765b079fa352258054d9cbe9285713376e23497c47e6734c3454c25be5

  • SSDEEP

    1536:IOtW6XP84HsBiRUiVYQZsG3kcgWsrwgPVflvDSnp/cYd6RoPbL:IAXPDMBd0lQZ92/aub

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d605374590e3fab70ebd17c673dd4c40N.exe

    • Size

      120KB

    • MD5

      d605374590e3fab70ebd17c673dd4c40

    • SHA1

      c309527d05f084ba51b4356f315e2c17527d945e

    • SHA256

      c40dc500009e2134d67477fe7f4ae1f77b11b2a6a3c4f4f57c2e3518878af6d7

    • SHA512

      cc16517e40c9a2933ded8af4cde24bffe27770cd06def149e8f5b4e33985b833026091765b079fa352258054d9cbe9285713376e23497c47e6734c3454c25be5

    • SSDEEP

      1536:IOtW6XP84HsBiRUiVYQZsG3kcgWsrwgPVflvDSnp/cYd6RoPbL:IAXPDMBd0lQZ92/aub

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks