General

  • Target

    bb1806337b974251b97461acba87e32c883a619915a628fdaa909531d30f9b30.exe

  • Size

    120KB

  • Sample

    241211-bjh48ayjdz

  • MD5

    dc9ca1f308dbf85100419f673af14426

  • SHA1

    25b65c6a7f6cb9e9786d8dce2a6cc596a72a208d

  • SHA256

    bb1806337b974251b97461acba87e32c883a619915a628fdaa909531d30f9b30

  • SHA512

    a5bf667f6f3593d57c93d2505f89e1db38c6fda52d09263d68637fa61dd8d836c6d0f8d553f156bb3f07d2c7d64801bcc8208506baa5ec923b2a295255e1d7ba

  • SSDEEP

    1536:eHUzwnLRsSuCgj0NQCCF+Bx5L3Yn9Pr/x2jcZl+MurmDN7qaIao7rFCAs3:UzLGYUFcOjQYjOmDNktfMf

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      bb1806337b974251b97461acba87e32c883a619915a628fdaa909531d30f9b30.exe

    • Size

      120KB

    • MD5

      dc9ca1f308dbf85100419f673af14426

    • SHA1

      25b65c6a7f6cb9e9786d8dce2a6cc596a72a208d

    • SHA256

      bb1806337b974251b97461acba87e32c883a619915a628fdaa909531d30f9b30

    • SHA512

      a5bf667f6f3593d57c93d2505f89e1db38c6fda52d09263d68637fa61dd8d836c6d0f8d553f156bb3f07d2c7d64801bcc8208506baa5ec923b2a295255e1d7ba

    • SSDEEP

      1536:eHUzwnLRsSuCgj0NQCCF+Bx5L3Yn9Pr/x2jcZl+MurmDN7qaIao7rFCAs3:UzLGYUFcOjQYjOmDNktfMf

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks