General

  • Target

    10299bba90929ba3fe1e8173c5089bb0fa98b40807015067caac07a475c0dae9.exe

  • Size

    2.1MB

  • Sample

    241205-aczyqatnfk

  • MD5

    e8f4a11cf984532b3d6e787fc3d26fac

  • SHA1

    6e08b2c6faa263aacd230ad21d861b1386765ff7

  • SHA256

    10299bba90929ba3fe1e8173c5089bb0fa98b40807015067caac07a475c0dae9

  • SHA512

    67b827fcdd05cf3cdd39c71bf22c66e8383b58925e57613d0867bb665803c499186947847201d0f4de15e01f0d4c85e7cb67d38acf4898d7cba1d0c5e73099b4

  • SSDEEP

    49152:AChEEex+dozhWk1pIEhhvq3eATSj8h8VgPX/RZb3e:AChEZ+CzYcpIEhh0RTSj8uVgPX/RZS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      10299bba90929ba3fe1e8173c5089bb0fa98b40807015067caac07a475c0dae9.exe

    • Size

      2.1MB

    • MD5

      e8f4a11cf984532b3d6e787fc3d26fac

    • SHA1

      6e08b2c6faa263aacd230ad21d861b1386765ff7

    • SHA256

      10299bba90929ba3fe1e8173c5089bb0fa98b40807015067caac07a475c0dae9

    • SHA512

      67b827fcdd05cf3cdd39c71bf22c66e8383b58925e57613d0867bb665803c499186947847201d0f4de15e01f0d4c85e7cb67d38acf4898d7cba1d0c5e73099b4

    • SSDEEP

      49152:AChEEex+dozhWk1pIEhhvq3eATSj8h8VgPX/RZb3e:AChEZ+CzYcpIEhh0RTSj8uVgPX/RZS

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks