General

  • Target

    96f7927ed838c750c3f18e49e6a8e229818b55bbd47e85f18835fc9646f47243.exe

  • Size

    120KB

  • Sample

    241210-zxn5dsynds

  • MD5

    3495662683cd3d7e8c32598aecad3e67

  • SHA1

    64bfb6bcec439bd1f94ed1c3fc4894f528471fa1

  • SHA256

    96f7927ed838c750c3f18e49e6a8e229818b55bbd47e85f18835fc9646f47243

  • SHA512

    9f8702c737b0401628dbfa593a8db51b5b0a29579c472543462ede70fcd6aef94bc67faec85d8959727305acef2e5ef09ef307b3cb283ab7df66c6299a20a490

  • SSDEEP

    1536:LekTrm6klZrijggIwG31KXboRv0Am7JmV0XI5sOH9n/eZEOJRtbpFW:CEGQj3IwOkSvLm7Jm2ifBe/bPW

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      96f7927ed838c750c3f18e49e6a8e229818b55bbd47e85f18835fc9646f47243.exe

    • Size

      120KB

    • MD5

      3495662683cd3d7e8c32598aecad3e67

    • SHA1

      64bfb6bcec439bd1f94ed1c3fc4894f528471fa1

    • SHA256

      96f7927ed838c750c3f18e49e6a8e229818b55bbd47e85f18835fc9646f47243

    • SHA512

      9f8702c737b0401628dbfa593a8db51b5b0a29579c472543462ede70fcd6aef94bc67faec85d8959727305acef2e5ef09ef307b3cb283ab7df66c6299a20a490

    • SSDEEP

      1536:LekTrm6klZrijggIwG31KXboRv0Am7JmV0XI5sOH9n/eZEOJRtbpFW:CEGQj3IwOkSvLm7Jm2ifBe/bPW

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks