General

  • Target

    ede1941c470159f8fcfc102144fa4778bdf41f0e06b4dbecb19aecba177dab53.exe

  • Size

    65KB

  • Sample

    241207-jja3lsspht

  • MD5

    904e0e1419d0ba7c08552edf51db7502

  • SHA1

    6343189bbd6f43602088dab1ac9da4121ff6f6e6

  • SHA256

    ede1941c470159f8fcfc102144fa4778bdf41f0e06b4dbecb19aecba177dab53

  • SHA512

    164da518eaa8ad472cbc73a7a5f0c1dee57d2552bda1d4a07fd1312a92ddce09d809bf546920d0997f906076ec0b4ef191bb985443929805c3f9afa82c9c1718

  • SSDEEP

    1536:pMeDOHN/in8oP+jz9wwoxyp0UYCe4rNgXhrs8QRJ+H1:pMEOHN/ih0NoxypT9xg5s8Qm1

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ede1941c470159f8fcfc102144fa4778bdf41f0e06b4dbecb19aecba177dab53.exe

    • Size

      65KB

    • MD5

      904e0e1419d0ba7c08552edf51db7502

    • SHA1

      6343189bbd6f43602088dab1ac9da4121ff6f6e6

    • SHA256

      ede1941c470159f8fcfc102144fa4778bdf41f0e06b4dbecb19aecba177dab53

    • SHA512

      164da518eaa8ad472cbc73a7a5f0c1dee57d2552bda1d4a07fd1312a92ddce09d809bf546920d0997f906076ec0b4ef191bb985443929805c3f9afa82c9c1718

    • SSDEEP

      1536:pMeDOHN/in8oP+jz9wwoxyp0UYCe4rNgXhrs8QRJ+H1:pMEOHN/ih0NoxypT9xg5s8Qm1

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks