General

  • Target

    79352802f33905a0fdb6042a12b117297dcb64f9cf0ad297b8446918656dbf8c.exe

  • Size

    65KB

  • Sample

    241203-prlrza1kgq

  • MD5

    ad302145891443c336bd02c952467572

  • SHA1

    f9fce9819b7a8f4f7e5d25b69e6df41d4795cbea

  • SHA256

    79352802f33905a0fdb6042a12b117297dcb64f9cf0ad297b8446918656dbf8c

  • SHA512

    82168f065801894a286d4bea4ff353c6a47c360e14d7c14affe1ad5f1452e161f30fd75d1822295588f6a46239dbb84ec00c94dd37cef32ede3374b2cc67e4b3

  • SSDEEP

    1536:dSBnhqRnbWOljKzfveZELNPCa+KSzk75nw92rCbMzJgh:dWnhqRbWOkzfvyQPC0S8lw9Qdgh

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      79352802f33905a0fdb6042a12b117297dcb64f9cf0ad297b8446918656dbf8c.exe

    • Size

      65KB

    • MD5

      ad302145891443c336bd02c952467572

    • SHA1

      f9fce9819b7a8f4f7e5d25b69e6df41d4795cbea

    • SHA256

      79352802f33905a0fdb6042a12b117297dcb64f9cf0ad297b8446918656dbf8c

    • SHA512

      82168f065801894a286d4bea4ff353c6a47c360e14d7c14affe1ad5f1452e161f30fd75d1822295588f6a46239dbb84ec00c94dd37cef32ede3374b2cc67e4b3

    • SSDEEP

      1536:dSBnhqRnbWOljKzfveZELNPCa+KSzk75nw92rCbMzJgh:dWnhqRbWOkzfvyQPC0S8lw9Qdgh

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks