General

  • Target

    fb6cbd0395d4be2152d5d02e7260b018c99627175e6f892b6bdff54733a51dccN.exe

  • Size

    120KB

  • Sample

    241210-p6xg1swkht

  • MD5

    c850cdd9bd068ddc8dec4268c33e7b00

  • SHA1

    995a542c22c7d9a94e5a1f79512bc02b0ee0483b

  • SHA256

    fb6cbd0395d4be2152d5d02e7260b018c99627175e6f892b6bdff54733a51dcc

  • SHA512

    f543e3b60a64b545802b0d06f59a390a09b8957841a24c4967fe65c0ac345a7bd779f7470251110e8a23a08556be81c1eb6391383fbfe39f54b044f344940021

  • SSDEEP

    3072:oouz3qhIgv6n9XHDPY8kwFF26Px3V58D:DAqny9zPYXwfhPx3V58D

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      fb6cbd0395d4be2152d5d02e7260b018c99627175e6f892b6bdff54733a51dccN.exe

    • Size

      120KB

    • MD5

      c850cdd9bd068ddc8dec4268c33e7b00

    • SHA1

      995a542c22c7d9a94e5a1f79512bc02b0ee0483b

    • SHA256

      fb6cbd0395d4be2152d5d02e7260b018c99627175e6f892b6bdff54733a51dcc

    • SHA512

      f543e3b60a64b545802b0d06f59a390a09b8957841a24c4967fe65c0ac345a7bd779f7470251110e8a23a08556be81c1eb6391383fbfe39f54b044f344940021

    • SSDEEP

      3072:oouz3qhIgv6n9XHDPY8kwFF26Px3V58D:DAqny9zPYXwfhPx3V58D

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks