General

  • Target

    674223b4a821becf17ab41b159cd6e2aabd07291d6dba0573410e6f6b437731f.exe

  • Size

    120KB

  • Sample

    241211-ane3pawnft

  • MD5

    b4dba59e4b30b24f36f1316bbc1da442

  • SHA1

    0bd3d953874ac8d02ceee50c62dbd254f7cc63ae

  • SHA256

    674223b4a821becf17ab41b159cd6e2aabd07291d6dba0573410e6f6b437731f

  • SHA512

    1a940cd8b1fc3da1fca173f9c583375616d72e6a025ee380334aa371e64c3f2789b79a85c65ed3afc348c4dbab08f0f3b132fde194dbd7c052892582bd420a4d

  • SSDEEP

    1536:5orE1mniLs+zhQhZQEuWkNDxoh+cO9HYV/lSeFeryXh7Zv91/z3rTr49adfWOpHH:nz+SG+94TS385rIaoO5DDn/3qnFoeB2N

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      674223b4a821becf17ab41b159cd6e2aabd07291d6dba0573410e6f6b437731f.exe

    • Size

      120KB

    • MD5

      b4dba59e4b30b24f36f1316bbc1da442

    • SHA1

      0bd3d953874ac8d02ceee50c62dbd254f7cc63ae

    • SHA256

      674223b4a821becf17ab41b159cd6e2aabd07291d6dba0573410e6f6b437731f

    • SHA512

      1a940cd8b1fc3da1fca173f9c583375616d72e6a025ee380334aa371e64c3f2789b79a85c65ed3afc348c4dbab08f0f3b132fde194dbd7c052892582bd420a4d

    • SSDEEP

      1536:5orE1mniLs+zhQhZQEuWkNDxoh+cO9HYV/lSeFeryXh7Zv91/z3rTr49adfWOpHH:nz+SG+94TS385rIaoO5DDn/3qnFoeB2N

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks