General

  • Target

    9c94c75dc5a732aba6d65ccf0309dc7e5f83855af51de165b75aae0ba180b681N.exe

  • Size

    3.7MB

  • Sample

    241207-yqh45awlhq

  • MD5

    3df0263434816d1f30983867c5ee4ae0

  • SHA1

    6a8686987f161ef03e7088079a2c6e6a5adab485

  • SHA256

    9c94c75dc5a732aba6d65ccf0309dc7e5f83855af51de165b75aae0ba180b681

  • SHA512

    fa0e884df0bb1640ab326d53fe302ef52f7cce9dea5b059c7ec109c32c5f8920a026296df6ac1e09bdf2a55aaa245598061be14142a2635f50d5930de6819784

  • SSDEEP

    98304:LP6HSaC1lfCng7PAu6FNxvWbrtUTrUHOi:LP6yaefhkpNx+NcIOi

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      9c94c75dc5a732aba6d65ccf0309dc7e5f83855af51de165b75aae0ba180b681N.exe

    • Size

      3.7MB

    • MD5

      3df0263434816d1f30983867c5ee4ae0

    • SHA1

      6a8686987f161ef03e7088079a2c6e6a5adab485

    • SHA256

      9c94c75dc5a732aba6d65ccf0309dc7e5f83855af51de165b75aae0ba180b681

    • SHA512

      fa0e884df0bb1640ab326d53fe302ef52f7cce9dea5b059c7ec109c32c5f8920a026296df6ac1e09bdf2a55aaa245598061be14142a2635f50d5930de6819784

    • SSDEEP

      98304:LP6HSaC1lfCng7PAu6FNxvWbrtUTrUHOi:LP6yaefhkpNx+NcIOi

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Deletes itself

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks