General

  • Target

    85d2ef372a9b279a79f134f37963fd7e8c95072ec13c38035f8f1d6657ad879d.exe

  • Size

    120KB

  • Sample

    241210-klts6swmgl

  • MD5

    ef781f1bebc24a658f465ac958c0f46f

  • SHA1

    22fbfe9daa0fcbaebdd26f4ce60d0d955a506c22

  • SHA256

    85d2ef372a9b279a79f134f37963fd7e8c95072ec13c38035f8f1d6657ad879d

  • SHA512

    4c070993565ba68f5d097e02bb5b3ea069dc0c6c26eda02035d0e15e312a9221f43d258a7811fe3ec1558a575e2f3ce5f2f79dc7a04d18677f31f751e5e16766

  • SSDEEP

    3072:zzGHkEObKjhYV6WXNm9AFWDBiWjHwJvSQ:HsjmV6WrFaVrevSQ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      85d2ef372a9b279a79f134f37963fd7e8c95072ec13c38035f8f1d6657ad879d.exe

    • Size

      120KB

    • MD5

      ef781f1bebc24a658f465ac958c0f46f

    • SHA1

      22fbfe9daa0fcbaebdd26f4ce60d0d955a506c22

    • SHA256

      85d2ef372a9b279a79f134f37963fd7e8c95072ec13c38035f8f1d6657ad879d

    • SHA512

      4c070993565ba68f5d097e02bb5b3ea069dc0c6c26eda02035d0e15e312a9221f43d258a7811fe3ec1558a575e2f3ce5f2f79dc7a04d18677f31f751e5e16766

    • SSDEEP

      3072:zzGHkEObKjhYV6WXNm9AFWDBiWjHwJvSQ:HsjmV6WrFaVrevSQ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks