General

  • Target

    69acbb0abeb273e3944189611b4c73e3782b72eb3d29f33399d55c800953bbd6.exe

  • Size

    65KB

  • Sample

    241206-x4ajgaypgm

  • MD5

    11ffdfe8d48dca7a16bf86930893e262

  • SHA1

    58ebaacc64707d190d29493266a25cfffa3fc5fd

  • SHA256

    69acbb0abeb273e3944189611b4c73e3782b72eb3d29f33399d55c800953bbd6

  • SHA512

    3fb16e0283483face2c0797e9842b533d735d0844c2f56295837f674d1908a3cd8bdbd6ce4cc6e5f350c7b9949c838ddb354d9dd89f897754b0b5e7e3f17de2c

  • SSDEEP

    1536:xbJzivzdj4h1WPpJVYQBPi7Or2Tb1Zas3L/G2:HcdEzWLVYQ952NZ1C2

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      69acbb0abeb273e3944189611b4c73e3782b72eb3d29f33399d55c800953bbd6.exe

    • Size

      65KB

    • MD5

      11ffdfe8d48dca7a16bf86930893e262

    • SHA1

      58ebaacc64707d190d29493266a25cfffa3fc5fd

    • SHA256

      69acbb0abeb273e3944189611b4c73e3782b72eb3d29f33399d55c800953bbd6

    • SHA512

      3fb16e0283483face2c0797e9842b533d735d0844c2f56295837f674d1908a3cd8bdbd6ce4cc6e5f350c7b9949c838ddb354d9dd89f897754b0b5e7e3f17de2c

    • SSDEEP

      1536:xbJzivzdj4h1WPpJVYQBPi7Or2Tb1Zas3L/G2:HcdEzWLVYQ952NZ1C2

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks