General

  • Target

    6dc3bea6ae109d0cf1192999ac7d2a1e5383a0fef562f295644e05b76e4da8c1N.exe

  • Size

    120KB

  • Sample

    241206-tfamsa1map

  • MD5

    2ea09ac747d586fbe7339ce81de532f0

  • SHA1

    a67b6cae9e3fcd5132b3e11322a7becd143a1841

  • SHA256

    6dc3bea6ae109d0cf1192999ac7d2a1e5383a0fef562f295644e05b76e4da8c1

  • SHA512

    92d4ed5d5dd1d1f1ad72f9601d3fe59ac1661c5826a054df5cf43071af9de2e4e74a0ae10009c735bb6603693b30ffa8bde05ed29739c97ab21cfe7514d5053a

  • SSDEEP

    1536:3ZlrSojzL4IsSu8SWffwmP7EH2nsAo/kZujNeoq3BPhxNCZyLvJvlqCa+J:3r3L4I5uiffHw2zolBteBP/NCkLvd

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      6dc3bea6ae109d0cf1192999ac7d2a1e5383a0fef562f295644e05b76e4da8c1N.exe

    • Size

      120KB

    • MD5

      2ea09ac747d586fbe7339ce81de532f0

    • SHA1

      a67b6cae9e3fcd5132b3e11322a7becd143a1841

    • SHA256

      6dc3bea6ae109d0cf1192999ac7d2a1e5383a0fef562f295644e05b76e4da8c1

    • SHA512

      92d4ed5d5dd1d1f1ad72f9601d3fe59ac1661c5826a054df5cf43071af9de2e4e74a0ae10009c735bb6603693b30ffa8bde05ed29739c97ab21cfe7514d5053a

    • SSDEEP

      1536:3ZlrSojzL4IsSu8SWffwmP7EH2nsAo/kZujNeoq3BPhxNCZyLvJvlqCa+J:3r3L4I5uiffHw2zolBteBP/NCkLvd

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks