General

  • Target

    fc6c4e80d19b321923e09919d9b4607c7e5b8163f8a533f41a3b29a2d912bf19N.exe

  • Size

    120KB

  • Sample

    241204-kbzxfavlcl

  • MD5

    9e6ff82e8d1554d37a11d4958df46150

  • SHA1

    de9bb3b54eea694101bc0d642a191d847587dc2c

  • SHA256

    fc6c4e80d19b321923e09919d9b4607c7e5b8163f8a533f41a3b29a2d912bf19

  • SHA512

    2275b3ff0f241f217f4adba4d88890cfdcceb2f24d9c02cfc95f5db602898cb5013d288e37935fb9c6d02f6725f59aae39f003b542840febe1a3687eb9002a01

  • SSDEEP

    3072:aaniXamvKL/u3We1Wzc86ASw4b9am/yJWHb:aaiXhiE8Xlsb

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      fc6c4e80d19b321923e09919d9b4607c7e5b8163f8a533f41a3b29a2d912bf19N.exe

    • Size

      120KB

    • MD5

      9e6ff82e8d1554d37a11d4958df46150

    • SHA1

      de9bb3b54eea694101bc0d642a191d847587dc2c

    • SHA256

      fc6c4e80d19b321923e09919d9b4607c7e5b8163f8a533f41a3b29a2d912bf19

    • SHA512

      2275b3ff0f241f217f4adba4d88890cfdcceb2f24d9c02cfc95f5db602898cb5013d288e37935fb9c6d02f6725f59aae39f003b542840febe1a3687eb9002a01

    • SSDEEP

      3072:aaniXamvKL/u3We1Wzc86ASw4b9am/yJWHb:aaiXhiE8Xlsb

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks