General

  • Target

    5a24ed7cf76a47f18b6c3274f8d4801812e429e112c6aee9991ce61b508ff7caN.exe

  • Size

    2.5MB

  • Sample

    241208-dysnbavpcq

  • MD5

    5c7a6e3cb62a92b237a79b4c65680af0

  • SHA1

    1f762b727aebe8abf5245f87b0070a6b5fbc7410

  • SHA256

    5a24ed7cf76a47f18b6c3274f8d4801812e429e112c6aee9991ce61b508ff7ca

  • SHA512

    6d786910dfd6a40bdb81699caaa42cf4be0664dc67ea07bc5740885084355b8f86d81ef50c8785687a2570664aa7278515e410a324ad0120f732ac76f541a944

  • SSDEEP

    49152:gKiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTz:hrZ23AbsK6Ro022JjL2WEiVqJZz

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      5a24ed7cf76a47f18b6c3274f8d4801812e429e112c6aee9991ce61b508ff7caN.exe

    • Size

      2.5MB

    • MD5

      5c7a6e3cb62a92b237a79b4c65680af0

    • SHA1

      1f762b727aebe8abf5245f87b0070a6b5fbc7410

    • SHA256

      5a24ed7cf76a47f18b6c3274f8d4801812e429e112c6aee9991ce61b508ff7ca

    • SHA512

      6d786910dfd6a40bdb81699caaa42cf4be0664dc67ea07bc5740885084355b8f86d81ef50c8785687a2570664aa7278515e410a324ad0120f732ac76f541a944

    • SSDEEP

      49152:gKiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTz:hrZ23AbsK6Ro022JjL2WEiVqJZz

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks