General

  • Target

    db4c562dc6d36b919c367ef82752d11cfec0875ff4de7667c6e2a85cf2836280N.exe

  • Size

    65KB

  • Sample

    241120-1vphtatqhz

  • MD5

    8f637e2c81457b87e6acc7416a388060

  • SHA1

    f19742aca0fc579171eae3b96c1d5bb816587878

  • SHA256

    db4c562dc6d36b919c367ef82752d11cfec0875ff4de7667c6e2a85cf2836280

  • SHA512

    9d16c8b5b561c2edc431bf43c2aa41919fdca7ffb40fb0bf7c3dbb12bb37696381463a44e556e24bfa9600a7c7466b2c6a6480fd804b2fd30ff51cf53b7d9f53

  • SSDEEP

    1536:+e0CB1IDqHuSd0CqixbMSMuFxAUoBhsLn+6od6CgKmUWiCUI31AnXaVosz6:z/sDqH70Cq9uFxeBhqn+/vgXzUkAnXa0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      db4c562dc6d36b919c367ef82752d11cfec0875ff4de7667c6e2a85cf2836280N.exe

    • Size

      65KB

    • MD5

      8f637e2c81457b87e6acc7416a388060

    • SHA1

      f19742aca0fc579171eae3b96c1d5bb816587878

    • SHA256

      db4c562dc6d36b919c367ef82752d11cfec0875ff4de7667c6e2a85cf2836280

    • SHA512

      9d16c8b5b561c2edc431bf43c2aa41919fdca7ffb40fb0bf7c3dbb12bb37696381463a44e556e24bfa9600a7c7466b2c6a6480fd804b2fd30ff51cf53b7d9f53

    • SSDEEP

      1536:+e0CB1IDqHuSd0CqixbMSMuFxAUoBhsLn+6od6CgKmUWiCUI31AnXaVosz6:z/sDqH70Cq9uFxeBhqn+/vgXzUkAnXa0

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks