General

  • Target

    d4f4de5eb374217eaa2af84af59bc62a5615fe3f5823ffe3a5f8d602742301ed.exe

  • Size

    8.7MB

  • Sample

    241206-vvgv3sykgs

  • MD5

    aec5c0551ee6b60b93e6c077e79ba9d4

  • SHA1

    45c43dd67703d05a773d1cda8724fb0e7094d2d1

  • SHA256

    d4f4de5eb374217eaa2af84af59bc62a5615fe3f5823ffe3a5f8d602742301ed

  • SHA512

    3e797e45601775d54e1643bf17f85f61f7aadef2feb71c17f79e55648e9a0a5fa1806ed59474e5868fef200f482e67daa632cbe747945aed98c2dd5810d9fa86

  • SSDEEP

    196608:YuOLrHbhonFpnMau33bP4QbS4xdKsAhqfmrze+fvLSWmF1PDX0bwc:4r7K7May3bfbSE6qfmHPKFW9

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d4f4de5eb374217eaa2af84af59bc62a5615fe3f5823ffe3a5f8d602742301ed.exe

    • Size

      8.7MB

    • MD5

      aec5c0551ee6b60b93e6c077e79ba9d4

    • SHA1

      45c43dd67703d05a773d1cda8724fb0e7094d2d1

    • SHA256

      d4f4de5eb374217eaa2af84af59bc62a5615fe3f5823ffe3a5f8d602742301ed

    • SHA512

      3e797e45601775d54e1643bf17f85f61f7aadef2feb71c17f79e55648e9a0a5fa1806ed59474e5868fef200f482e67daa632cbe747945aed98c2dd5810d9fa86

    • SSDEEP

      196608:YuOLrHbhonFpnMau33bP4QbS4xdKsAhqfmrze+fvLSWmF1PDX0bwc:4r7K7May3bfbSE6qfmHPKFW9

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks