General

  • Target

    b4c57c8fa5eb475318aefad0e332aa5056064476694beacacc86323430a07a71N.exe

  • Size

    120KB

  • Sample

    241204-2dv5psvjfy

  • MD5

    ef5aeeb9c7064b6ffa40e7dc93291c50

  • SHA1

    f72858c2d18c0d47986ba84851ef5eb3ebb4dd05

  • SHA256

    b4c57c8fa5eb475318aefad0e332aa5056064476694beacacc86323430a07a71

  • SHA512

    20a4326bfd38af3249435e89644ca2a3be217e9f77667530cf3a269b17adf7fe7e7e877572d71233672026b149e84c37996c23837347b0f891cc4c9fa10723e6

  • SSDEEP

    3072:LCixXchlE7LpWYcyu9HtFiyB0KHX7T34c:L32h678DyugyBLL74c

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      b4c57c8fa5eb475318aefad0e332aa5056064476694beacacc86323430a07a71N.exe

    • Size

      120KB

    • MD5

      ef5aeeb9c7064b6ffa40e7dc93291c50

    • SHA1

      f72858c2d18c0d47986ba84851ef5eb3ebb4dd05

    • SHA256

      b4c57c8fa5eb475318aefad0e332aa5056064476694beacacc86323430a07a71

    • SHA512

      20a4326bfd38af3249435e89644ca2a3be217e9f77667530cf3a269b17adf7fe7e7e877572d71233672026b149e84c37996c23837347b0f891cc4c9fa10723e6

    • SSDEEP

      3072:LCixXchlE7LpWYcyu9HtFiyB0KHX7T34c:L32h678DyugyBLL74c

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks