General

  • Target

    ba2d26f195b8424fc21aa238278f276933781adbc4e30ccd87ceec02942b4ae2N.exe

  • Size

    120KB

  • Sample

    241206-2pcsha1qhy

  • MD5

    75564552b20eb7a08778b5060880b540

  • SHA1

    b6cefb65b7240f5ed7258e49645b09483550e468

  • SHA256

    ba2d26f195b8424fc21aa238278f276933781adbc4e30ccd87ceec02942b4ae2

  • SHA512

    e80a698a76614500f4716a6099dd99ff148ca7b26686ab484807b982d7d36f31838328178758e6ae28adb1e1ab57e5ea8b944fdd5acd3783c552403956f0c7e7

  • SSDEEP

    1536:0vL+SuGuUxqQM8qxBGBX5rxxYCKWyz5kcN3+iEZ0ccknBy:9SjMd36JYHz5k63+iMr

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ba2d26f195b8424fc21aa238278f276933781adbc4e30ccd87ceec02942b4ae2N.exe

    • Size

      120KB

    • MD5

      75564552b20eb7a08778b5060880b540

    • SHA1

      b6cefb65b7240f5ed7258e49645b09483550e468

    • SHA256

      ba2d26f195b8424fc21aa238278f276933781adbc4e30ccd87ceec02942b4ae2

    • SHA512

      e80a698a76614500f4716a6099dd99ff148ca7b26686ab484807b982d7d36f31838328178758e6ae28adb1e1ab57e5ea8b944fdd5acd3783c552403956f0c7e7

    • SSDEEP

      1536:0vL+SuGuUxqQM8qxBGBX5rxxYCKWyz5kcN3+iEZ0ccknBy:9SjMd36JYHz5k63+iMr

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks