General

  • Target

    fdb9bb2d1e21794ed7aadb7fbe4215a6466b8ce4ec09ba86abd2ba647cce66afN.exe

  • Size

    120KB

  • Sample

    241207-lyvfxasrcm

  • MD5

    31b8a071a2c376b42d20e2c8ef553300

  • SHA1

    4bc352e32127de1c335d5ad7d05e9ea5ce562c71

  • SHA256

    fdb9bb2d1e21794ed7aadb7fbe4215a6466b8ce4ec09ba86abd2ba647cce66af

  • SHA512

    f9d3620de62e48d5480bd0393bbe851af2e4950b123970bad5cc1cf92938bea499d015a407b0f2e0f22e8e4dadcf0415191fd5a45acc682c67d7219f0636115d

  • SSDEEP

    1536:xaXZ0we7YIPMNoL0j/71OOXxonKB1WRmfzC8CGmOw+e7tbLL:xaXZ0weDQZt/zWRmfGbv3+e7FLL

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      fdb9bb2d1e21794ed7aadb7fbe4215a6466b8ce4ec09ba86abd2ba647cce66afN.exe

    • Size

      120KB

    • MD5

      31b8a071a2c376b42d20e2c8ef553300

    • SHA1

      4bc352e32127de1c335d5ad7d05e9ea5ce562c71

    • SHA256

      fdb9bb2d1e21794ed7aadb7fbe4215a6466b8ce4ec09ba86abd2ba647cce66af

    • SHA512

      f9d3620de62e48d5480bd0393bbe851af2e4950b123970bad5cc1cf92938bea499d015a407b0f2e0f22e8e4dadcf0415191fd5a45acc682c67d7219f0636115d

    • SSDEEP

      1536:xaXZ0we7YIPMNoL0j/71OOXxonKB1WRmfzC8CGmOw+e7tbLL:xaXZ0weDQZt/zWRmfGbv3+e7FLL

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks