General

  • Target

    bf5f997310b0ac02f5b3ebfe3e6b5a399244a61979183a7355cbda9b8efb9803N.exe

  • Size

    120KB

  • Sample

    241211-gp3npszmfs

  • MD5

    50d48d39fe31d837a8e88c48d4403530

  • SHA1

    cd37f9462f7ccf4f2a77e2d137fbaf4c87bbf8cb

  • SHA256

    bf5f997310b0ac02f5b3ebfe3e6b5a399244a61979183a7355cbda9b8efb9803

  • SHA512

    6b68f3800e380dec86ce869ccbcca2195f930a23257d19777bcc4986b50fca301905d3576d127ed059610d99b1f9073d021e8780f490f2c8ab638f1c4ed2a3d0

  • SSDEEP

    3072:7OrkZbQYxeiRgcN9fMQ473TvijHaISQcR:7sKeegrQ47+eHF

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      bf5f997310b0ac02f5b3ebfe3e6b5a399244a61979183a7355cbda9b8efb9803N.exe

    • Size

      120KB

    • MD5

      50d48d39fe31d837a8e88c48d4403530

    • SHA1

      cd37f9462f7ccf4f2a77e2d137fbaf4c87bbf8cb

    • SHA256

      bf5f997310b0ac02f5b3ebfe3e6b5a399244a61979183a7355cbda9b8efb9803

    • SHA512

      6b68f3800e380dec86ce869ccbcca2195f930a23257d19777bcc4986b50fca301905d3576d127ed059610d99b1f9073d021e8780f490f2c8ab638f1c4ed2a3d0

    • SSDEEP

      3072:7OrkZbQYxeiRgcN9fMQ473TvijHaISQcR:7sKeegrQ47+eHF

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks