General

  • Target

    bd5cf618924bd297606918336a67ef6d3a5d0015efb5b4388357de2107aadabcN.exe

  • Size

    120KB

  • Sample

    241207-z3llfstpbv

  • MD5

    a6e0ef3be175b94f025ea905fe9f3ca0

  • SHA1

    93110b3d3af3ae366d8611a332b93fa3b7d2898d

  • SHA256

    bd5cf618924bd297606918336a67ef6d3a5d0015efb5b4388357de2107aadabc

  • SHA512

    6725d31630108ffc95e1a0018e1f4468901e2effe361cb6f162ccb7625bbaf39fc1f00b204423ae39ea09ca867a14765e484b3a06af24826e87c949d4be8e549

  • SSDEEP

    3072:hCQjI+prbd1+3LtrpCidQ87+2MDu9tDIWgi6:hCQk+pnqhi87+6T

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      bd5cf618924bd297606918336a67ef6d3a5d0015efb5b4388357de2107aadabcN.exe

    • Size

      120KB

    • MD5

      a6e0ef3be175b94f025ea905fe9f3ca0

    • SHA1

      93110b3d3af3ae366d8611a332b93fa3b7d2898d

    • SHA256

      bd5cf618924bd297606918336a67ef6d3a5d0015efb5b4388357de2107aadabc

    • SHA512

      6725d31630108ffc95e1a0018e1f4468901e2effe361cb6f162ccb7625bbaf39fc1f00b204423ae39ea09ca867a14765e484b3a06af24826e87c949d4be8e549

    • SSDEEP

      3072:hCQjI+prbd1+3LtrpCidQ87+2MDu9tDIWgi6:hCQk+pnqhi87+6T

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks