General

  • Target

    0c394ebede826f663c6d51f13fb45dae093d81b57858dd3166b7cbb67954ca15N.exe

  • Size

    120KB

  • Sample

    241210-29eslayqgl

  • MD5

    18ec33ce30cb6fac98df750075936300

  • SHA1

    bc6491a3aad4942b734f23d7d5719c5b66af7609

  • SHA256

    0c394ebede826f663c6d51f13fb45dae093d81b57858dd3166b7cbb67954ca15

  • SHA512

    5b13ad1f70788a6fc96615a0d803d20769d6a8fbb834c209e43722e7c503767023e2e2c3f7263c5136c664a711c343c0716776e9f0a463cee0d108fcfc2daede

  • SSDEEP

    1536:kyR53zD1Z+wSCuaYArPtdf+6AgsrXbm4lKbpR77t1KvA4R6q78rw1bWxIkOXlD:dt+w11hrVdrrID81R/tQTR6qPkcD

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0c394ebede826f663c6d51f13fb45dae093d81b57858dd3166b7cbb67954ca15N.exe

    • Size

      120KB

    • MD5

      18ec33ce30cb6fac98df750075936300

    • SHA1

      bc6491a3aad4942b734f23d7d5719c5b66af7609

    • SHA256

      0c394ebede826f663c6d51f13fb45dae093d81b57858dd3166b7cbb67954ca15

    • SHA512

      5b13ad1f70788a6fc96615a0d803d20769d6a8fbb834c209e43722e7c503767023e2e2c3f7263c5136c664a711c343c0716776e9f0a463cee0d108fcfc2daede

    • SSDEEP

      1536:kyR53zD1Z+wSCuaYArPtdf+6AgsrXbm4lKbpR77t1KvA4R6q78rw1bWxIkOXlD:dt+w11hrVdrrID81R/tQTR6qPkcD

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks