General

  • Target

    09ded679c3cc34a5f693510d16c1cb522e9e9d26ec7ff48b1dc9a46502eb1345N.exe

  • Size

    755KB

  • Sample

    241215-237vsstkbn

  • MD5

    3e2f18e9187b944b393458e60263e8d0

  • SHA1

    1101e49cf90fc2296747a91390774fdc9b053f6d

  • SHA256

    09ded679c3cc34a5f693510d16c1cb522e9e9d26ec7ff48b1dc9a46502eb1345

  • SHA512

    7885c281b6fd1ffab56e689f636a4a142d1133d7ff21cfca265006289a8edadc2078627e2bceb4e865d000e4c233d2219f64871da0b112cfa87fbc888cb2aabf

  • SSDEEP

    12288:FhnwBK8tUEMK+hVO4St+/JvbY9FVPluzZFOPNcUng5emptT198gDzy8a4oEF3bj2:FhnwBKKUEMK+bvbYFdufOFc75zj8WJat

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      09ded679c3cc34a5f693510d16c1cb522e9e9d26ec7ff48b1dc9a46502eb1345N.exe

    • Size

      755KB

    • MD5

      3e2f18e9187b944b393458e60263e8d0

    • SHA1

      1101e49cf90fc2296747a91390774fdc9b053f6d

    • SHA256

      09ded679c3cc34a5f693510d16c1cb522e9e9d26ec7ff48b1dc9a46502eb1345

    • SHA512

      7885c281b6fd1ffab56e689f636a4a142d1133d7ff21cfca265006289a8edadc2078627e2bceb4e865d000e4c233d2219f64871da0b112cfa87fbc888cb2aabf

    • SSDEEP

      12288:FhnwBK8tUEMK+hVO4St+/JvbY9FVPluzZFOPNcUng5emptT198gDzy8a4oEF3bj2:FhnwBKKUEMK+bvbYFdufOFc75zj8WJat

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks