General

  • Target

    531d090c340a4ac61ec0442f574f45c7284c263d67f2ef3ffc5db64b5d24bb10N.exe

  • Size

    120KB

  • Sample

    241207-zkcktsspey

  • MD5

    ed1bbef8c3b42905de9f72b6063c8d10

  • SHA1

    8129fa9d51e33c4c411655dfb86ecb8ff50f8593

  • SHA256

    531d090c340a4ac61ec0442f574f45c7284c263d67f2ef3ffc5db64b5d24bb10

  • SHA512

    b36c9c048130a5aeed64c3a37c0b8ae962bc0ff7f7ea7bb8523d9308affc0b7494f556f447d790bd73ad01046a7bf88c24587fd7704c18eae0dcb7d8b6b289dd

  • SSDEEP

    3072:Py1dUDwEcMquaJ9QMbaoWP9wL55Mz0wvi:a1dQcACafa5iZvi

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      531d090c340a4ac61ec0442f574f45c7284c263d67f2ef3ffc5db64b5d24bb10N.exe

    • Size

      120KB

    • MD5

      ed1bbef8c3b42905de9f72b6063c8d10

    • SHA1

      8129fa9d51e33c4c411655dfb86ecb8ff50f8593

    • SHA256

      531d090c340a4ac61ec0442f574f45c7284c263d67f2ef3ffc5db64b5d24bb10

    • SHA512

      b36c9c048130a5aeed64c3a37c0b8ae962bc0ff7f7ea7bb8523d9308affc0b7494f556f447d790bd73ad01046a7bf88c24587fd7704c18eae0dcb7d8b6b289dd

    • SSDEEP

      3072:Py1dUDwEcMquaJ9QMbaoWP9wL55Mz0wvi:a1dQcACafa5iZvi

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks