General

  • Target

    1786f9c537b2d9f9551d0edf4c9b0d1d73c3bf94397ea344b93b688628213702N.exe

  • Size

    120KB

  • Sample

    241211-jbfywssqfy

  • MD5

    916f89286399f2f15d4b1705d02c7ec0

  • SHA1

    8be3ad8a04e6edbf735efcd9418b4b67b3c7dea4

  • SHA256

    1786f9c537b2d9f9551d0edf4c9b0d1d73c3bf94397ea344b93b688628213702

  • SHA512

    73e185eef1e07f6694cff92c52380732e223a4fe6ce039fd6dccb721260424e9df8c6ad7ca4c5c9623f8cb3e154232cfc7d0553d14c80fae0f21958dba6b73fc

  • SSDEEP

    1536:G3jCKCtQbCPcB/j4ZXRWOvHCT9qfNLSIPEUO4+M2WdZI292ZZZU:GJC+bCPcB/kZXFvZhSOG4+MvZ7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1786f9c537b2d9f9551d0edf4c9b0d1d73c3bf94397ea344b93b688628213702N.exe

    • Size

      120KB

    • MD5

      916f89286399f2f15d4b1705d02c7ec0

    • SHA1

      8be3ad8a04e6edbf735efcd9418b4b67b3c7dea4

    • SHA256

      1786f9c537b2d9f9551d0edf4c9b0d1d73c3bf94397ea344b93b688628213702

    • SHA512

      73e185eef1e07f6694cff92c52380732e223a4fe6ce039fd6dccb721260424e9df8c6ad7ca4c5c9623f8cb3e154232cfc7d0553d14c80fae0f21958dba6b73fc

    • SSDEEP

      1536:G3jCKCtQbCPcB/j4ZXRWOvHCT9qfNLSIPEUO4+M2WdZI292ZZZU:GJC+bCPcB/kZXFvZhSOG4+MvZ7

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks