General

  • Target

    81ce31befb556b3b1bd2c5c4ae856ed699bf6834762b7f1e0b6649ab239a56afN.exe

  • Size

    120KB

  • Sample

    241207-w3g2gsxqb1

  • MD5

    85480369e78c1a3ca3d5d0cd7c189910

  • SHA1

    9afdf036da5cc5e30d40018e8af18b24970c7049

  • SHA256

    81ce31befb556b3b1bd2c5c4ae856ed699bf6834762b7f1e0b6649ab239a56af

  • SHA512

    d02c754aed0f46d704a1aea1c23af10d87e1b751f507b24e818dcee2b60c3c607864ae818097ba497f9f2a033e2b8e4bf199b81c794e594faf47da927dbcefc7

  • SSDEEP

    1536:G6nHX+sLm6SVf/4HcVU6CzvacOuQtaeAPo0wZN7gJ8ahvTqkZ3mUy5IRZCLS34jm:LnHOKmFxhFCacOunErMN3VF53yRHg

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      81ce31befb556b3b1bd2c5c4ae856ed699bf6834762b7f1e0b6649ab239a56afN.exe

    • Size

      120KB

    • MD5

      85480369e78c1a3ca3d5d0cd7c189910

    • SHA1

      9afdf036da5cc5e30d40018e8af18b24970c7049

    • SHA256

      81ce31befb556b3b1bd2c5c4ae856ed699bf6834762b7f1e0b6649ab239a56af

    • SHA512

      d02c754aed0f46d704a1aea1c23af10d87e1b751f507b24e818dcee2b60c3c607864ae818097ba497f9f2a033e2b8e4bf199b81c794e594faf47da927dbcefc7

    • SSDEEP

      1536:G6nHX+sLm6SVf/4HcVU6CzvacOuQtaeAPo0wZN7gJ8ahvTqkZ3mUy5IRZCLS34jm:LnHOKmFxhFCacOunErMN3VF53yRHg

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks