General

  • Target

    bc6025de6b223efa2deb32a16215c840N.exe

  • Size

    120KB

  • Sample

    240821-wa1m5asaqh

  • MD5

    bc6025de6b223efa2deb32a16215c840

  • SHA1

    9d69d45a8afe119b5d8b83a8bb9aef96166b59d8

  • SHA256

    9597542566c6172b9c7adb4ca6227c85b59648c67ef4d4e8baabf7a8e42733d5

  • SHA512

    de813c03044e9adda26b0d14e9c8f5b160da5c5cc870f84a0407ff2b470b5a4dd96191ef49669b785059ca2b3d62a38fb1c06d66eae8cc729a0b39eb4ea60c2e

  • SSDEEP

    1536:yohYwT2c8bX1VDrJk/bn3tCHuufKaM8/MgS1prYAk/HPwLAwsqVa:fJ1gX7DU3tCHumKaM8/Mpdqw0aa

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      bc6025de6b223efa2deb32a16215c840N.exe

    • Size

      120KB

    • MD5

      bc6025de6b223efa2deb32a16215c840

    • SHA1

      9d69d45a8afe119b5d8b83a8bb9aef96166b59d8

    • SHA256

      9597542566c6172b9c7adb4ca6227c85b59648c67ef4d4e8baabf7a8e42733d5

    • SHA512

      de813c03044e9adda26b0d14e9c8f5b160da5c5cc870f84a0407ff2b470b5a4dd96191ef49669b785059ca2b3d62a38fb1c06d66eae8cc729a0b39eb4ea60c2e

    • SSDEEP

      1536:yohYwT2c8bX1VDrJk/bn3tCHuufKaM8/MgS1prYAk/HPwLAwsqVa:fJ1gX7DU3tCHumKaM8/Mpdqw0aa

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks