General

  • Target

    3d69e4f954d559ec3eb234329b1cba93c27b7a8d10c01228f9285b9d9b038038.exe

  • Size

    1.8MB

  • Sample

    241206-xv1djaykcj

  • MD5

    1f893ca731b07b11b4b29f975818506a

  • SHA1

    033e63c422189b41cc910674458c84753792a9a5

  • SHA256

    3d69e4f954d559ec3eb234329b1cba93c27b7a8d10c01228f9285b9d9b038038

  • SHA512

    2d2581c26861f9eb964f1567d199cba063de378b4fc5c80f9ca79f78b8fc4d3253a6adf9bde3a4a5541a75e0ce4ddf97beb59e34a07d079fc9eff5e60767046f

  • SSDEEP

    49152:Qu0LSVHASxN9aD7sOP93ZPaZRNsa95ZN5YK3:X0mVgSxa872av1

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      3d69e4f954d559ec3eb234329b1cba93c27b7a8d10c01228f9285b9d9b038038.exe

    • Size

      1.8MB

    • MD5

      1f893ca731b07b11b4b29f975818506a

    • SHA1

      033e63c422189b41cc910674458c84753792a9a5

    • SHA256

      3d69e4f954d559ec3eb234329b1cba93c27b7a8d10c01228f9285b9d9b038038

    • SHA512

      2d2581c26861f9eb964f1567d199cba063de378b4fc5c80f9ca79f78b8fc4d3253a6adf9bde3a4a5541a75e0ce4ddf97beb59e34a07d079fc9eff5e60767046f

    • SSDEEP

      49152:Qu0LSVHASxN9aD7sOP93ZPaZRNsa95ZN5YK3:X0mVgSxa872av1

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks