General

  • Target

    9824a885f350eaa1541bd4fb08fb38f818dcf30ee8cfe9a9e5000ee604e92abeN.exe

  • Size

    2.5MB

  • Sample

    241208-e1slrssnet

  • MD5

    f476d1aa1061ed5e0ad33096fecd56e0

  • SHA1

    d48875c158382425310cc5ca19d5090037134314

  • SHA256

    9824a885f350eaa1541bd4fb08fb38f818dcf30ee8cfe9a9e5000ee604e92abe

  • SHA512

    2fe052dcdbbc5a76390f5f613c9fd8139ffc6cba5c921cafad40f7212dd12f5487e1b06424ce34beb769cd9ea99774db4c3dc2049fa0ab4ab89a0bd792bff2aa

  • SSDEEP

    49152:ZKiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTnn:arZ23AbsK6Ro022JjL2WEiVqJZn

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      9824a885f350eaa1541bd4fb08fb38f818dcf30ee8cfe9a9e5000ee604e92abeN.exe

    • Size

      2.5MB

    • MD5

      f476d1aa1061ed5e0ad33096fecd56e0

    • SHA1

      d48875c158382425310cc5ca19d5090037134314

    • SHA256

      9824a885f350eaa1541bd4fb08fb38f818dcf30ee8cfe9a9e5000ee604e92abe

    • SHA512

      2fe052dcdbbc5a76390f5f613c9fd8139ffc6cba5c921cafad40f7212dd12f5487e1b06424ce34beb769cd9ea99774db4c3dc2049fa0ab4ab89a0bd792bff2aa

    • SSDEEP

      49152:ZKiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTnn:arZ23AbsK6Ro022JjL2WEiVqJZn

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks