General

  • Target

    bde8c63fda79e46c6bb46ecafd95915cca58542300996d13d489ee8cec695c7cN.exe

  • Size

    120KB

  • Sample

    241208-bb3hwstles

  • MD5

    7fa4b7bc05e28325c08371059aeb8c00

  • SHA1

    f7655ad4fc396a1391aa45a36b4013e97c41cb1c

  • SHA256

    bde8c63fda79e46c6bb46ecafd95915cca58542300996d13d489ee8cec695c7c

  • SHA512

    e77cf6bb0a26462ca659a04da3c59c4a9d9c1a981026073b8c847d6a32b7692394011d61a62e33ff556c04175eb0a0abf245154aa4c455b6441dbaa4f257bd84

  • SSDEEP

    1536:sPoPkj0tzzFGaerogrcNybFm0QBQEPyRaJ4z0F69No3qkkpxFDmmfO7XvtISs1RC:mCmYzzFTorcNQIBacJqR6kXkDXVEw

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      bde8c63fda79e46c6bb46ecafd95915cca58542300996d13d489ee8cec695c7cN.exe

    • Size

      120KB

    • MD5

      7fa4b7bc05e28325c08371059aeb8c00

    • SHA1

      f7655ad4fc396a1391aa45a36b4013e97c41cb1c

    • SHA256

      bde8c63fda79e46c6bb46ecafd95915cca58542300996d13d489ee8cec695c7c

    • SHA512

      e77cf6bb0a26462ca659a04da3c59c4a9d9c1a981026073b8c847d6a32b7692394011d61a62e33ff556c04175eb0a0abf245154aa4c455b6441dbaa4f257bd84

    • SSDEEP

      1536:sPoPkj0tzzFGaerogrcNybFm0QBQEPyRaJ4z0F69No3qkkpxFDmmfO7XvtISs1RC:mCmYzzFTorcNQIBacJqR6kXkDXVEw

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks