General

  • Target

    55ebc7e7ea4a2108746395fb63df79edfba1fd8f9e1691b4c992035f0f048c28N.exe

  • Size

    120KB

  • Sample

    241121-g74cyszjbx

  • MD5

    149c2368dbe1cf077158ce1fbdac9010

  • SHA1

    7b58c52e976d7c254ec57010f4a5d3440d949535

  • SHA256

    55ebc7e7ea4a2108746395fb63df79edfba1fd8f9e1691b4c992035f0f048c28

  • SHA512

    451958ea5ae024d6218b799e477dda9a1fb16fcb9c16c2700171224380211727d2dddef58b0c97e86673304affd4549a34395e6cde50f3ae351f0d9d34152bd3

  • SSDEEP

    3072:Erm9OP/yYDlB2Q5vBZiyGEQuglxU9/Gb:L0PVl8QtziN2gg/0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      55ebc7e7ea4a2108746395fb63df79edfba1fd8f9e1691b4c992035f0f048c28N.exe

    • Size

      120KB

    • MD5

      149c2368dbe1cf077158ce1fbdac9010

    • SHA1

      7b58c52e976d7c254ec57010f4a5d3440d949535

    • SHA256

      55ebc7e7ea4a2108746395fb63df79edfba1fd8f9e1691b4c992035f0f048c28

    • SHA512

      451958ea5ae024d6218b799e477dda9a1fb16fcb9c16c2700171224380211727d2dddef58b0c97e86673304affd4549a34395e6cde50f3ae351f0d9d34152bd3

    • SSDEEP

      3072:Erm9OP/yYDlB2Q5vBZiyGEQuglxU9/Gb:L0PVl8QtziN2gg/0

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks