General

  • Target

    812be1d65df03d161c1d0fc7e3cf3365592923bc69bf5ba18171018ad2d07184.exe

  • Size

    120KB

  • Sample

    241211-k4e3qszrgp

  • MD5

    51be7c2c4f515baa585791f71e8cbe3b

  • SHA1

    61ba1e9f2f4ed63c399b7ca50f6dc8786cfa9f5d

  • SHA256

    812be1d65df03d161c1d0fc7e3cf3365592923bc69bf5ba18171018ad2d07184

  • SHA512

    2f2469c7e9ed3bf94a289088c334d962951384cd6504b2bd556d0a93197cb428c0d2797d22fb09852b6fd0e05a6125488f9c3ad664ff99957d0a5da51f5dee9e

  • SSDEEP

    1536:G3jCKCtQbCPcB/j4ZXRWOvHCT9qfNLSIPEUO4+M2WdZI292ZZZUA:GJC+bCPcB/kZXFvZhSOG4+MvZ7A

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      812be1d65df03d161c1d0fc7e3cf3365592923bc69bf5ba18171018ad2d07184.exe

    • Size

      120KB

    • MD5

      51be7c2c4f515baa585791f71e8cbe3b

    • SHA1

      61ba1e9f2f4ed63c399b7ca50f6dc8786cfa9f5d

    • SHA256

      812be1d65df03d161c1d0fc7e3cf3365592923bc69bf5ba18171018ad2d07184

    • SHA512

      2f2469c7e9ed3bf94a289088c334d962951384cd6504b2bd556d0a93197cb428c0d2797d22fb09852b6fd0e05a6125488f9c3ad664ff99957d0a5da51f5dee9e

    • SSDEEP

      1536:G3jCKCtQbCPcB/j4ZXRWOvHCT9qfNLSIPEUO4+M2WdZI292ZZZUA:GJC+bCPcB/kZXFvZhSOG4+MvZ7A

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks