General

  • Target

    a60207a7b7201c3128e73154aa40173678162fd656f65ee7f90328dc8e1f318dN.exe

  • Size

    65KB

  • Sample

    241205-l9awmszmat

  • MD5

    4d00ac4f4ef6ab295dcf434c8b8768b0

  • SHA1

    677911b27f2dfd620c7eb3e81b08068252028cde

  • SHA256

    a60207a7b7201c3128e73154aa40173678162fd656f65ee7f90328dc8e1f318d

  • SHA512

    de6e5b37e60607423ea00b07976d03cfe8f13ebe788b8d772762ea77253b9075a2fd281e9210d90cfac24d9da78665c66d98911b88fc06584f321b9d490105cf

  • SSDEEP

    1536:evRqLh0qpdz3ofu7TJYVJ2+l0bvcITuY1bsUGY85:e52uqTzYUM2+l0QITuYiUjk

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a60207a7b7201c3128e73154aa40173678162fd656f65ee7f90328dc8e1f318dN.exe

    • Size

      65KB

    • MD5

      4d00ac4f4ef6ab295dcf434c8b8768b0

    • SHA1

      677911b27f2dfd620c7eb3e81b08068252028cde

    • SHA256

      a60207a7b7201c3128e73154aa40173678162fd656f65ee7f90328dc8e1f318d

    • SHA512

      de6e5b37e60607423ea00b07976d03cfe8f13ebe788b8d772762ea77253b9075a2fd281e9210d90cfac24d9da78665c66d98911b88fc06584f321b9d490105cf

    • SSDEEP

      1536:evRqLh0qpdz3ofu7TJYVJ2+l0bvcITuY1bsUGY85:e52uqTzYUM2+l0QITuYiUjk

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks