General

  • Target

    4c035e9f412f050e34aeb9aa4a2784996e99d94bd433b0256e5b59c5b64b6ba3N.exe

  • Size

    65KB

  • Sample

    241215-1xf98a1jbj

  • MD5

    3aaf1525989b259dbec40e4c9daad330

  • SHA1

    d06c2779cb68566da05a681a9757071ec089351f

  • SHA256

    4c035e9f412f050e34aeb9aa4a2784996e99d94bd433b0256e5b59c5b64b6ba3

  • SHA512

    49491a55fa11efd084fe6ff0e34a3fea60154576d034207b04b7223f687405db12e969760912e8099cbc4b7cca15077ef722b8dc5faaea747dcb5bd683bb3cdd

  • SSDEEP

    1536:pjDd1w2r5Os+IjHq8ED/PEwMID6TLHLh4OC:pjDnZws+IUhDULrh4OC

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4c035e9f412f050e34aeb9aa4a2784996e99d94bd433b0256e5b59c5b64b6ba3N.exe

    • Size

      65KB

    • MD5

      3aaf1525989b259dbec40e4c9daad330

    • SHA1

      d06c2779cb68566da05a681a9757071ec089351f

    • SHA256

      4c035e9f412f050e34aeb9aa4a2784996e99d94bd433b0256e5b59c5b64b6ba3

    • SHA512

      49491a55fa11efd084fe6ff0e34a3fea60154576d034207b04b7223f687405db12e969760912e8099cbc4b7cca15077ef722b8dc5faaea747dcb5bd683bb3cdd

    • SSDEEP

      1536:pjDd1w2r5Os+IjHq8ED/PEwMID6TLHLh4OC:pjDnZws+IUhDULrh4OC

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks