General

  • Target

    eacaeaae44c0a716fd3da03a221161814d43f9f557519cddcc7899377c66a365.exe

  • Size

    120KB

  • Sample

    241207-l1kz9axmd1

  • MD5

    1a011fd4712a1722341f0cb9b133e8f4

  • SHA1

    f5279240a781c47fb4535552b818f9670126f6ed

  • SHA256

    eacaeaae44c0a716fd3da03a221161814d43f9f557519cddcc7899377c66a365

  • SHA512

    f399a7e4ecec86ea04653b173ec187763826f325ce63ad3cfce66c21b0aaceec60fa6c022815e7ba5ff1391907bd6a3c094b98c95bd4922913900bbbbf3920c4

  • SSDEEP

    3072:937hGWP19X5hWaoIC+B+jboGLmXDd1EEdDyU4Yb:5dT1h8l+akuWd1nDyUbb

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      eacaeaae44c0a716fd3da03a221161814d43f9f557519cddcc7899377c66a365.exe

    • Size

      120KB

    • MD5

      1a011fd4712a1722341f0cb9b133e8f4

    • SHA1

      f5279240a781c47fb4535552b818f9670126f6ed

    • SHA256

      eacaeaae44c0a716fd3da03a221161814d43f9f557519cddcc7899377c66a365

    • SHA512

      f399a7e4ecec86ea04653b173ec187763826f325ce63ad3cfce66c21b0aaceec60fa6c022815e7ba5ff1391907bd6a3c094b98c95bd4922913900bbbbf3920c4

    • SSDEEP

      3072:937hGWP19X5hWaoIC+B+jboGLmXDd1EEdDyU4Yb:5dT1h8l+akuWd1nDyUbb

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks