General

  • Target

    bba6884a07f670095d85c7e4f0687ed263a70110da2954e237834c1965122e31.exe

  • Size

    115KB

  • Sample

    241210-tqfa1szmbt

  • MD5

    44f87bdd3a6c94914f33c86e6f3ab592

  • SHA1

    6aa7b6b54a87a3a6983e7274c1234842084b9930

  • SHA256

    bba6884a07f670095d85c7e4f0687ed263a70110da2954e237834c1965122e31

  • SHA512

    b9fde5f14c049868e85a2f4a23f7777e569ce61051cd6ea6c48d30ca7733606c37f0befd4f58ada2a53b96b80cf5a6a93e43dd62a7d03e8bc10025dffcd09ea7

  • SSDEEP

    3072:5jJEnbppQmJtRDBVl5FNuHM56oYFE5PX/C:5w6MD15CshQExX/C

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      bba6884a07f670095d85c7e4f0687ed263a70110da2954e237834c1965122e31.exe

    • Size

      115KB

    • MD5

      44f87bdd3a6c94914f33c86e6f3ab592

    • SHA1

      6aa7b6b54a87a3a6983e7274c1234842084b9930

    • SHA256

      bba6884a07f670095d85c7e4f0687ed263a70110da2954e237834c1965122e31

    • SHA512

      b9fde5f14c049868e85a2f4a23f7777e569ce61051cd6ea6c48d30ca7733606c37f0befd4f58ada2a53b96b80cf5a6a93e43dd62a7d03e8bc10025dffcd09ea7

    • SSDEEP

      3072:5jJEnbppQmJtRDBVl5FNuHM56oYFE5PX/C:5w6MD15CshQExX/C

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks