General

  • Target

    c9e126c4756c94f5c998944ff068f88cd998d67aaab9d54036070ef25a57d42d.exe

  • Size

    65KB

  • Sample

    241211-kgyassvncv

  • MD5

    301dcd05e5e3dcec6fadbd7d857a2bd5

  • SHA1

    ef7c8758e1dc53e2596c95291551a2ac521cc92f

  • SHA256

    c9e126c4756c94f5c998944ff068f88cd998d67aaab9d54036070ef25a57d42d

  • SHA512

    b7991fcc1dd94d21ab1607dd100dc12d1b9144c9055f5c5f72665bcd4bdfd17d9451783df38cba72d0a03278a7d233fd2f6fea06b4659e9c567915c6794cc2d2

  • SSDEEP

    1536:Sa4ETqzz4W4Ca3SxWN6YtRwQvD5YOO8xN6jAjItkD:TMzk5IWNpiQr8jAjItkD

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c9e126c4756c94f5c998944ff068f88cd998d67aaab9d54036070ef25a57d42d.exe

    • Size

      65KB

    • MD5

      301dcd05e5e3dcec6fadbd7d857a2bd5

    • SHA1

      ef7c8758e1dc53e2596c95291551a2ac521cc92f

    • SHA256

      c9e126c4756c94f5c998944ff068f88cd998d67aaab9d54036070ef25a57d42d

    • SHA512

      b7991fcc1dd94d21ab1607dd100dc12d1b9144c9055f5c5f72665bcd4bdfd17d9451783df38cba72d0a03278a7d233fd2f6fea06b4659e9c567915c6794cc2d2

    • SSDEEP

      1536:Sa4ETqzz4W4Ca3SxWN6YtRwQvD5YOO8xN6jAjItkD:TMzk5IWNpiQr8jAjItkD

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks