General

  • Target

    281e8e54be61d34868e3603d60c92a1600b1d24f9ccee2ee8c7e33548433a4c9N.exe

  • Size

    120KB

  • Sample

    241206-x46a5syqdq

  • MD5

    61f2677dd7545e11c3f88a10f0964f40

  • SHA1

    55aeecc19a33ae7270c4cca9c6b6d0df60001c5a

  • SHA256

    281e8e54be61d34868e3603d60c92a1600b1d24f9ccee2ee8c7e33548433a4c9

  • SHA512

    4c2c12091656a6f046fa8fbe8fb31f566cce92ba7ca36661ee4aed886539b07c02625604f0bb90727f9a7b84d5c6ee8511c818542b6c63d31f9c91a3cb3ddb5b

  • SSDEEP

    3072:BfgyUuoeZSWns25wctvaUJOdpB/7U/5P9w0kTKC:BfgCopctvaUJIz/Y

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      281e8e54be61d34868e3603d60c92a1600b1d24f9ccee2ee8c7e33548433a4c9N.exe

    • Size

      120KB

    • MD5

      61f2677dd7545e11c3f88a10f0964f40

    • SHA1

      55aeecc19a33ae7270c4cca9c6b6d0df60001c5a

    • SHA256

      281e8e54be61d34868e3603d60c92a1600b1d24f9ccee2ee8c7e33548433a4c9

    • SHA512

      4c2c12091656a6f046fa8fbe8fb31f566cce92ba7ca36661ee4aed886539b07c02625604f0bb90727f9a7b84d5c6ee8511c818542b6c63d31f9c91a3cb3ddb5b

    • SSDEEP

      3072:BfgyUuoeZSWns25wctvaUJOdpB/7U/5P9w0kTKC:BfgCopctvaUJIz/Y

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks