General

  • Target

    98dd134258951763f2dfdc26de977fec8b33d63c03f55a2d407b9b4f3b148b39.exe

  • Size

    120KB

  • Sample

    241207-j8d6katqaw

  • MD5

    b8f8937c4c29ddde7d481292ae5b0b49

  • SHA1

    e68a4f7beeb3ce26f88d32252e49687364a368b1

  • SHA256

    98dd134258951763f2dfdc26de977fec8b33d63c03f55a2d407b9b4f3b148b39

  • SHA512

    5ede285c19f6ae89a6bce0eb0e8c2f2d52c3025dbae52ece1c1e98cbabd79ac695b9c0f1a14c70e76551cd0138a3dc4cae74db84646f55e4fd5f25b104a8a76d

  • SSDEEP

    1536:xaXZ0we7YIPMNoL0j/71OOXxonKB1WRmfzC8CGmOw+e7tbLLu:xaXZ0weDQZt/zWRmfGbv3+e7FLLu

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      98dd134258951763f2dfdc26de977fec8b33d63c03f55a2d407b9b4f3b148b39.exe

    • Size

      120KB

    • MD5

      b8f8937c4c29ddde7d481292ae5b0b49

    • SHA1

      e68a4f7beeb3ce26f88d32252e49687364a368b1

    • SHA256

      98dd134258951763f2dfdc26de977fec8b33d63c03f55a2d407b9b4f3b148b39

    • SHA512

      5ede285c19f6ae89a6bce0eb0e8c2f2d52c3025dbae52ece1c1e98cbabd79ac695b9c0f1a14c70e76551cd0138a3dc4cae74db84646f55e4fd5f25b104a8a76d

    • SSDEEP

      1536:xaXZ0we7YIPMNoL0j/71OOXxonKB1WRmfzC8CGmOw+e7tbLLu:xaXZ0weDQZt/zWRmfGbv3+e7FLLu

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks