General

  • Target

    5447a59294bb91f27bad4a9c81aa6978c729214b3b40b1121c126c5b9c01a1a1N.exe

  • Size

    120KB

  • Sample

    241207-alvqcs1qcn

  • MD5

    c607654f7b9e7919630666b439d7b080

  • SHA1

    47e58b051a60cc4f9a6f8d03184370117def45e6

  • SHA256

    5447a59294bb91f27bad4a9c81aa6978c729214b3b40b1121c126c5b9c01a1a1

  • SHA512

    d25575151f17b356806779ccc2403b610c7b4ac2eee93a867a7c6d6fec660e1190f3b9ba725791927a6615c848beae6190747d51064bc5d8e2274349c9fe1dae

  • SSDEEP

    3072:suDeambp515fNW4T4MnOCqb9knnL4Yo2:VDj2p5DfkBGOCqbKLW

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      5447a59294bb91f27bad4a9c81aa6978c729214b3b40b1121c126c5b9c01a1a1N.exe

    • Size

      120KB

    • MD5

      c607654f7b9e7919630666b439d7b080

    • SHA1

      47e58b051a60cc4f9a6f8d03184370117def45e6

    • SHA256

      5447a59294bb91f27bad4a9c81aa6978c729214b3b40b1121c126c5b9c01a1a1

    • SHA512

      d25575151f17b356806779ccc2403b610c7b4ac2eee93a867a7c6d6fec660e1190f3b9ba725791927a6615c848beae6190747d51064bc5d8e2274349c9fe1dae

    • SSDEEP

      3072:suDeambp515fNW4T4MnOCqb9knnL4Yo2:VDj2p5DfkBGOCqbKLW

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks