General

  • Target

    e269932f318c1836c517495db150335f00ebd813f02769d62e14fb6c116373c6.exe

  • Size

    732KB

  • Sample

    241204-f254xsyqem

  • MD5

    1002e596de5159bbc4f6af05be0e0c70

  • SHA1

    093b3b59e09404198a4686f6ced0b3796ba24bac

  • SHA256

    e269932f318c1836c517495db150335f00ebd813f02769d62e14fb6c116373c6

  • SHA512

    04652d88700d02070227afb86d19a4e0f14872c4a4c56a65d86f0478a16cdd20a435faa11fe3dd251c96929b6f2a5085f1a042540abdc87a977292893a6d4e87

  • SSDEEP

    12288:dTyjXW+48qWywrU4kGFezOAVuJ5PI7ww7F5DO3HYffCmEoyYoQ:BIXW/8yw1ez54lIXF5SXYHRnL

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e269932f318c1836c517495db150335f00ebd813f02769d62e14fb6c116373c6.exe

    • Size

      732KB

    • MD5

      1002e596de5159bbc4f6af05be0e0c70

    • SHA1

      093b3b59e09404198a4686f6ced0b3796ba24bac

    • SHA256

      e269932f318c1836c517495db150335f00ebd813f02769d62e14fb6c116373c6

    • SHA512

      04652d88700d02070227afb86d19a4e0f14872c4a4c56a65d86f0478a16cdd20a435faa11fe3dd251c96929b6f2a5085f1a042540abdc87a977292893a6d4e87

    • SSDEEP

      12288:dTyjXW+48qWywrU4kGFezOAVuJ5PI7ww7F5DO3HYffCmEoyYoQ:BIXW/8yw1ez54lIXF5SXYHRnL

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks