General

  • Target

    cf9623adae1c82a80b01173fa6f7c78d7291b1db670b3c6b6a37efc030b4011b.exe

  • Size

    120KB

  • Sample

    241207-hqzh4s1ndy

  • MD5

    e3488bf60c8cb3c6118fc1fabcc7c038

  • SHA1

    8df03900becfabcaaae1527e40604bddb16b10c6

  • SHA256

    cf9623adae1c82a80b01173fa6f7c78d7291b1db670b3c6b6a37efc030b4011b

  • SHA512

    b027aa550992f61d8d05dc8b411b9675daa55114951ddebb257dc78a48cfc27048c21bd4ec1f33b6cca7818d571c2840ab1a0ff45f7d27876f948762516e89ce

  • SSDEEP

    3072:5+B2XKzarj38plpyW0RACoH3cR6FyJD/d:5+6rD8plpyLRAbH3ccF6

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      cf9623adae1c82a80b01173fa6f7c78d7291b1db670b3c6b6a37efc030b4011b.exe

    • Size

      120KB

    • MD5

      e3488bf60c8cb3c6118fc1fabcc7c038

    • SHA1

      8df03900becfabcaaae1527e40604bddb16b10c6

    • SHA256

      cf9623adae1c82a80b01173fa6f7c78d7291b1db670b3c6b6a37efc030b4011b

    • SHA512

      b027aa550992f61d8d05dc8b411b9675daa55114951ddebb257dc78a48cfc27048c21bd4ec1f33b6cca7818d571c2840ab1a0ff45f7d27876f948762516e89ce

    • SSDEEP

      3072:5+B2XKzarj38plpyW0RACoH3cR6FyJD/d:5+6rD8plpyLRAbH3ccF6

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks