General

  • Target

    7670b3a4bb5e42a421f48c9cd3bd2365643b7027eeecd0ec4301741439b4b540N.exe

  • Size

    120KB

  • Sample

    241210-lrnd1sxncr

  • MD5

    1749b23a2d380ccacf278f082ae949a0

  • SHA1

    d72ac9c7959713e2b1282d3b82a9013f29237eb3

  • SHA256

    7670b3a4bb5e42a421f48c9cd3bd2365643b7027eeecd0ec4301741439b4b540

  • SHA512

    d6a9fce79d7d0854c3be9a02d342277de80e7d4625db07a701ae8a567ffd3ee726a4d024d04e15bc1bd4a06d02295971e712cdf70e010f0f4dc58775f0d8bf38

  • SSDEEP

    3072:OJv0HORJ8lEd09CySf7I2y3v8iEo6KzpNd8c9iSwG:ICqJXqCyS8JEiEoTd8c

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      7670b3a4bb5e42a421f48c9cd3bd2365643b7027eeecd0ec4301741439b4b540N.exe

    • Size

      120KB

    • MD5

      1749b23a2d380ccacf278f082ae949a0

    • SHA1

      d72ac9c7959713e2b1282d3b82a9013f29237eb3

    • SHA256

      7670b3a4bb5e42a421f48c9cd3bd2365643b7027eeecd0ec4301741439b4b540

    • SHA512

      d6a9fce79d7d0854c3be9a02d342277de80e7d4625db07a701ae8a567ffd3ee726a4d024d04e15bc1bd4a06d02295971e712cdf70e010f0f4dc58775f0d8bf38

    • SSDEEP

      3072:OJv0HORJ8lEd09CySf7I2y3v8iEo6KzpNd8c9iSwG:ICqJXqCyS8JEiEoTd8c

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks