General

  • Target

    77e067b6bbcc2793822394cc3c592f35586919845ef399f4c862f161bad3bdcd.exe

  • Size

    120KB

  • Sample

    241206-21vgpaymdm

  • MD5

    13fafa04737cfb4f268dc263a85bba49

  • SHA1

    7512db10f4c93a73ea12d23cd8e9fadb7475644c

  • SHA256

    77e067b6bbcc2793822394cc3c592f35586919845ef399f4c862f161bad3bdcd

  • SHA512

    7b4cae8790303c72b02ff04b2f140410bed9fe793ef5c54678ab49298d2565cb0a1cff670fbbeebbce09e63e3591c3fd48ad539f085a5d0aee7271243ff8b912

  • SSDEEP

    1536:0vL+SuGuUxqQM8qxBGBX5rxxYCKWyz5kcN3+iEZ0ccknByt:9SjMd36JYHz5k63+iMrS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      77e067b6bbcc2793822394cc3c592f35586919845ef399f4c862f161bad3bdcd.exe

    • Size

      120KB

    • MD5

      13fafa04737cfb4f268dc263a85bba49

    • SHA1

      7512db10f4c93a73ea12d23cd8e9fadb7475644c

    • SHA256

      77e067b6bbcc2793822394cc3c592f35586919845ef399f4c862f161bad3bdcd

    • SHA512

      7b4cae8790303c72b02ff04b2f140410bed9fe793ef5c54678ab49298d2565cb0a1cff670fbbeebbce09e63e3591c3fd48ad539f085a5d0aee7271243ff8b912

    • SSDEEP

      1536:0vL+SuGuUxqQM8qxBGBX5rxxYCKWyz5kcN3+iEZ0ccknByt:9SjMd36JYHz5k63+iMrS

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks