General

  • Target

    1378952f64668be6082141193073c4d7059b92238ca91de1fc56aae10901a10bN.exe

  • Size

    120KB

  • Sample

    241215-29xy6stmeq

  • MD5

    619b9d6bb76a1423e631a85fc8975170

  • SHA1

    e613d9bb73b264ef4e23986f99cc05ec1a024988

  • SHA256

    1378952f64668be6082141193073c4d7059b92238ca91de1fc56aae10901a10b

  • SHA512

    d0c542c8ba698c40edd0b04eeca628744380b6c0ee422bf483b3f7205d0ccdc61b745eefd2233d3f606e0ab8cd6ba49fd79a125d47541dc2965aac20ffdaa935

  • SSDEEP

    1536:PquvTI0u4KPLHJno6Q5KHihXQ0hYi3OAGuZyHR91WDKcp/W/tsYtEgwiBcOe:Pd7buLDJo64B9L390RIKcZ6D5U

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1378952f64668be6082141193073c4d7059b92238ca91de1fc56aae10901a10bN.exe

    • Size

      120KB

    • MD5

      619b9d6bb76a1423e631a85fc8975170

    • SHA1

      e613d9bb73b264ef4e23986f99cc05ec1a024988

    • SHA256

      1378952f64668be6082141193073c4d7059b92238ca91de1fc56aae10901a10b

    • SHA512

      d0c542c8ba698c40edd0b04eeca628744380b6c0ee422bf483b3f7205d0ccdc61b745eefd2233d3f606e0ab8cd6ba49fd79a125d47541dc2965aac20ffdaa935

    • SSDEEP

      1536:PquvTI0u4KPLHJno6Q5KHihXQ0hYi3OAGuZyHR91WDKcp/W/tsYtEgwiBcOe:Pd7buLDJo64B9L390RIKcZ6D5U

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks