General

  • Target

    13a0cf6f7420a1da0f734dd0047ff2acd11cac47c30eb76ba8aed2373bc86339N.exe

  • Size

    120KB

  • Sample

    241215-25s5es1qet

  • MD5

    3ec90f220d08b3178f10064901fc8640

  • SHA1

    3e9bc037959e8519cb508c85cbc90122f950ffb1

  • SHA256

    13a0cf6f7420a1da0f734dd0047ff2acd11cac47c30eb76ba8aed2373bc86339

  • SHA512

    93db679d6f3ab367bb06434a4e10b188c7f97c48c7b396e00c249587ae9ac92bb1c00d17e237994e9d4c80221d6db358a6056a1b1e7c1776842aa896ced12be2

  • SSDEEP

    3072:pf09qg9Et+p8Z/+ubdOmqjNBLhlVMirB:pf0R2t+pE+ub0m+L7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      13a0cf6f7420a1da0f734dd0047ff2acd11cac47c30eb76ba8aed2373bc86339N.exe

    • Size

      120KB

    • MD5

      3ec90f220d08b3178f10064901fc8640

    • SHA1

      3e9bc037959e8519cb508c85cbc90122f950ffb1

    • SHA256

      13a0cf6f7420a1da0f734dd0047ff2acd11cac47c30eb76ba8aed2373bc86339

    • SHA512

      93db679d6f3ab367bb06434a4e10b188c7f97c48c7b396e00c249587ae9ac92bb1c00d17e237994e9d4c80221d6db358a6056a1b1e7c1776842aa896ced12be2

    • SSDEEP

      3072:pf09qg9Et+p8Z/+ubdOmqjNBLhlVMirB:pf0R2t+pE+ub0m+L7

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks