General

  • Target

    feb1389bdbe5b93ff47b968a14c3df0470acfce4f7941779f6105566743371f4.exe

  • Size

    120KB

  • Sample

    241207-lqzqnasnfl

  • MD5

    3fa356d8b6189002a497bba5b1e49ec1

  • SHA1

    c993072e5fcaafb8cb23ec0d53f0b0ceae64521e

  • SHA256

    feb1389bdbe5b93ff47b968a14c3df0470acfce4f7941779f6105566743371f4

  • SHA512

    b324b82c476ef66b85da2b8abb0cc20f02025a41e64ebf56e4bb6a7c7a34d7d538036a5f9d6d93d8ee81979c795ccbce985af2140568002f70eeceabba3ec7f0

  • SSDEEP

    1536:UJR9w6drqcD4F1l4kbXOoL7wyYG3wlNwKSzvVr4q8DZ/j/kzUj80YxFF0Mu:CuJ/3i5yUruz9ENZ/Hj81FF+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      feb1389bdbe5b93ff47b968a14c3df0470acfce4f7941779f6105566743371f4.exe

    • Size

      120KB

    • MD5

      3fa356d8b6189002a497bba5b1e49ec1

    • SHA1

      c993072e5fcaafb8cb23ec0d53f0b0ceae64521e

    • SHA256

      feb1389bdbe5b93ff47b968a14c3df0470acfce4f7941779f6105566743371f4

    • SHA512

      b324b82c476ef66b85da2b8abb0cc20f02025a41e64ebf56e4bb6a7c7a34d7d538036a5f9d6d93d8ee81979c795ccbce985af2140568002f70eeceabba3ec7f0

    • SSDEEP

      1536:UJR9w6drqcD4F1l4kbXOoL7wyYG3wlNwKSzvVr4q8DZ/j/kzUj80YxFF0Mu:CuJ/3i5yUruz9ENZ/Hj81FF+

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks