General

  • Target

    cdefa42b06a791d68bd1c6e94451d0f04c7111ed96c067ca5a735c48e02e2a72N.exe

  • Size

    65KB

  • Sample

    241120-1azhaatbqb

  • MD5

    d95d9a9565c1fc2158ed98b5c5db8f40

  • SHA1

    f71db501a919452a28f9f74ace072fd5aabebd1f

  • SHA256

    cdefa42b06a791d68bd1c6e94451d0f04c7111ed96c067ca5a735c48e02e2a72

  • SHA512

    eec8df9470c96986e2db08977628cca34299b23297a9bc87dbb2e4b9e956879485fbd6744c475047f85d5249c2ae4e1b1b07eab541186092092cbc19c22f47de

  • SSDEEP

    1536:lesNpqR7S4eg+yVLL2LUl7z9kEeAvPEDpmC:lvNpqR75xEQz9kE/E3

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      cdefa42b06a791d68bd1c6e94451d0f04c7111ed96c067ca5a735c48e02e2a72N.exe

    • Size

      65KB

    • MD5

      d95d9a9565c1fc2158ed98b5c5db8f40

    • SHA1

      f71db501a919452a28f9f74ace072fd5aabebd1f

    • SHA256

      cdefa42b06a791d68bd1c6e94451d0f04c7111ed96c067ca5a735c48e02e2a72

    • SHA512

      eec8df9470c96986e2db08977628cca34299b23297a9bc87dbb2e4b9e956879485fbd6744c475047f85d5249c2ae4e1b1b07eab541186092092cbc19c22f47de

    • SSDEEP

      1536:lesNpqR7S4eg+yVLL2LUl7z9kEeAvPEDpmC:lvNpqR75xEQz9kE/E3

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks