General

  • Target

    a88ed4c1c7ee088cb5954d41ea604af87e7cdb2858914537137b7bcbdc655e34.exe

  • Size

    120KB

  • Sample

    241206-w3mlza1jes

  • MD5

    6dfa885e54ee2857bb9a8b7fc713a986

  • SHA1

    cbd51b6202037bc25dc1b9e51363d96b8be3b4ce

  • SHA256

    a88ed4c1c7ee088cb5954d41ea604af87e7cdb2858914537137b7bcbdc655e34

  • SHA512

    6e273eb3f603396f8cc46a4b067b6575ac6754770ec941c653c5591708984d4afbd1c7b384a21ab0f124eee7ded0ccb07092849b4890a70106f44edd4a824d9d

  • SSDEEP

    3072:eOsVtD0/PwyPhG75qZCNcQ/b1mfU4J6FsIN:eOkabP05qwiA1mRmsIN

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a88ed4c1c7ee088cb5954d41ea604af87e7cdb2858914537137b7bcbdc655e34.exe

    • Size

      120KB

    • MD5

      6dfa885e54ee2857bb9a8b7fc713a986

    • SHA1

      cbd51b6202037bc25dc1b9e51363d96b8be3b4ce

    • SHA256

      a88ed4c1c7ee088cb5954d41ea604af87e7cdb2858914537137b7bcbdc655e34

    • SHA512

      6e273eb3f603396f8cc46a4b067b6575ac6754770ec941c653c5591708984d4afbd1c7b384a21ab0f124eee7ded0ccb07092849b4890a70106f44edd4a824d9d

    • SSDEEP

      3072:eOsVtD0/PwyPhG75qZCNcQ/b1mfU4J6FsIN:eOkabP05qwiA1mRmsIN

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks