General

  • Target

    ea9fc82a8e9f6a12d560abd29ce254f0N.exe

  • Size

    120KB

  • Sample

    240905-pg5gbs1fld

  • MD5

    ea9fc82a8e9f6a12d560abd29ce254f0

  • SHA1

    460369833910f1e9c57bb23f7143f4175c5a3367

  • SHA256

    b05f557767f39cab362f088c7544a50475a9c4900889da75791a0f9bbf5eb430

  • SHA512

    9a4f10c5087268cf98413d63c2a529507682fb51a47a955ecd3bf164137b8bc9d6c3c129720809912bf520403039f229363cfca10f09d4b0ad54e2cf76ca9db6

  • SSDEEP

    3072:Hq3rcWdKuU90PBdBXOroxc4Ls1oLMtkEb0i:KQWUyXBXOelfAtkU

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ea9fc82a8e9f6a12d560abd29ce254f0N.exe

    • Size

      120KB

    • MD5

      ea9fc82a8e9f6a12d560abd29ce254f0

    • SHA1

      460369833910f1e9c57bb23f7143f4175c5a3367

    • SHA256

      b05f557767f39cab362f088c7544a50475a9c4900889da75791a0f9bbf5eb430

    • SHA512

      9a4f10c5087268cf98413d63c2a529507682fb51a47a955ecd3bf164137b8bc9d6c3c129720809912bf520403039f229363cfca10f09d4b0ad54e2cf76ca9db6

    • SSDEEP

      3072:Hq3rcWdKuU90PBdBXOroxc4Ls1oLMtkEb0i:KQWUyXBXOelfAtkU

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks