General

  • Target

    e6ff11edf943bb76b527f340127a52017ec89c498e0493930a27edb847ebf7feN.exe

  • Size

    65KB

  • Sample

    241207-m1p5mszkdy

  • MD5

    2de241ac455999133fcd71f65d440900

  • SHA1

    15c3914bb9c36ca49c847a70e9c3f7b7118266c2

  • SHA256

    e6ff11edf943bb76b527f340127a52017ec89c498e0493930a27edb847ebf7fe

  • SHA512

    fe252f21098d4a4174ad7e703f284a2a68915859db44bc2e40bf827eacfeeafec1639fa2fe7f3f05aea16e4753e712054c049196ea99c522405d4e4bc840dbc3

  • SSDEEP

    1536:DYdwY3Xn1TNqLp2MXvlSQGji0k2Ni4yr/XNwm:8q8FBqdrlo2d2Dyr/dwm

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e6ff11edf943bb76b527f340127a52017ec89c498e0493930a27edb847ebf7feN.exe

    • Size

      65KB

    • MD5

      2de241ac455999133fcd71f65d440900

    • SHA1

      15c3914bb9c36ca49c847a70e9c3f7b7118266c2

    • SHA256

      e6ff11edf943bb76b527f340127a52017ec89c498e0493930a27edb847ebf7fe

    • SHA512

      fe252f21098d4a4174ad7e703f284a2a68915859db44bc2e40bf827eacfeeafec1639fa2fe7f3f05aea16e4753e712054c049196ea99c522405d4e4bc840dbc3

    • SSDEEP

      1536:DYdwY3Xn1TNqLp2MXvlSQGji0k2Ni4yr/XNwm:8q8FBqdrlo2d2Dyr/dwm

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks