General

  • Target

    9b5d229878b94dd7ec60341154eba7f1979ef3b33ecb3869c9ce0ba977491ae9N.exe

  • Size

    286KB

  • Sample

    241210-y8ceassncj

  • MD5

    6754e357ab9b6c1ab54eff2533984b40

  • SHA1

    c722597b487cdfa5b54e355260a7fed67da9b295

  • SHA256

    9b5d229878b94dd7ec60341154eba7f1979ef3b33ecb3869c9ce0ba977491ae9

  • SHA512

    abefb2cdbed9f40970a36df9a76cd0c8a7f30ce3c87c526307683ed483a77cb42ee1cea1917df80e560b57cf10efe6cdbef5ec0959e722ee4bad49342e6593fb

  • SSDEEP

    6144:fSiKFdQky0OLKs4xEQUAjdInjBfaiMkxuz38SrvspvW90lmVP:WdQkhOLKsQEQUAjdInjBfaiMkxuz38SP

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      9b5d229878b94dd7ec60341154eba7f1979ef3b33ecb3869c9ce0ba977491ae9N.exe

    • Size

      286KB

    • MD5

      6754e357ab9b6c1ab54eff2533984b40

    • SHA1

      c722597b487cdfa5b54e355260a7fed67da9b295

    • SHA256

      9b5d229878b94dd7ec60341154eba7f1979ef3b33ecb3869c9ce0ba977491ae9

    • SHA512

      abefb2cdbed9f40970a36df9a76cd0c8a7f30ce3c87c526307683ed483a77cb42ee1cea1917df80e560b57cf10efe6cdbef5ec0959e722ee4bad49342e6593fb

    • SSDEEP

      6144:fSiKFdQky0OLKs4xEQUAjdInjBfaiMkxuz38SrvspvW90lmVP:WdQkhOLKsQEQUAjdInjBfaiMkxuz38SP

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks