General

  • Target

    258863cd3ae4433e884447b66f78c0a0N.exe

  • Size

    120KB

  • Sample

    240824-sb14havhnf

  • MD5

    258863cd3ae4433e884447b66f78c0a0

  • SHA1

    10269222590dc1ab2233deb15c6ad6789c932f88

  • SHA256

    8d3703a5b4a1767712da3277a59a5d844621ebc541045debdad4cbf87b331fa0

  • SHA512

    6f219b3f56ab1a90c2474271d5be6bd56fc99b3a4b4a0f22210323203ba27fb4cf38778db025da6e36dd8e13f7b9b8795e0344d51e7e7e49aa6e0e252e63fa8f

  • SSDEEP

    3072:j/8UIyWVdb37W0i1Px8eSVMRwUKxRhZRZncE:rcyWVdDhG8eyMRwUKxrZn

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      258863cd3ae4433e884447b66f78c0a0N.exe

    • Size

      120KB

    • MD5

      258863cd3ae4433e884447b66f78c0a0

    • SHA1

      10269222590dc1ab2233deb15c6ad6789c932f88

    • SHA256

      8d3703a5b4a1767712da3277a59a5d844621ebc541045debdad4cbf87b331fa0

    • SHA512

      6f219b3f56ab1a90c2474271d5be6bd56fc99b3a4b4a0f22210323203ba27fb4cf38778db025da6e36dd8e13f7b9b8795e0344d51e7e7e49aa6e0e252e63fa8f

    • SSDEEP

      3072:j/8UIyWVdb37W0i1Px8eSVMRwUKxRhZRZncE:rcyWVdDhG8eyMRwUKxrZn

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks