General

  • Target

    5a705a3b6361becbf721b97ce9d56c870dd5492c114d8b1c27378802f88eeab1N.exe

  • Size

    120KB

  • Sample

    241206-rqlrpa1qb1

  • MD5

    4b0e577bba05ec5cda5bc78c29c8b430

  • SHA1

    0b5e215668b81a0b6014ed504cd415b3a193c03d

  • SHA256

    5a705a3b6361becbf721b97ce9d56c870dd5492c114d8b1c27378802f88eeab1

  • SHA512

    449450d06cf20c773d99a0f2bb87a1ec45212378cc6692632e997474c2f488537b68fdac3c89eba4b658675eff3600a954bff72586da37167f0cfb829dd37d55

  • SSDEEP

    3072:MMrRcAV7RvOT1Y2QJj5rnxJwrlcjKhrwWb:P6AFRmxYFJxgZcjPq

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      5a705a3b6361becbf721b97ce9d56c870dd5492c114d8b1c27378802f88eeab1N.exe

    • Size

      120KB

    • MD5

      4b0e577bba05ec5cda5bc78c29c8b430

    • SHA1

      0b5e215668b81a0b6014ed504cd415b3a193c03d

    • SHA256

      5a705a3b6361becbf721b97ce9d56c870dd5492c114d8b1c27378802f88eeab1

    • SHA512

      449450d06cf20c773d99a0f2bb87a1ec45212378cc6692632e997474c2f488537b68fdac3c89eba4b658675eff3600a954bff72586da37167f0cfb829dd37d55

    • SSDEEP

      3072:MMrRcAV7RvOT1Y2QJj5rnxJwrlcjKhrwWb:P6AFRmxYFJxgZcjPq

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks