General

  • Target

    ba351a64b455226c4d87f7dd3e4413c75c0cb7c13a03e70e422d3d33adf7b5f0N.exe

  • Size

    120KB

  • Sample

    241215-2qmzvs1kbz

  • MD5

    3242d7f5a760f33cdfa83eb8a5fce020

  • SHA1

    d2f1f9cea8f83774f53eddf45c9f62c67d5168be

  • SHA256

    ba351a64b455226c4d87f7dd3e4413c75c0cb7c13a03e70e422d3d33adf7b5f0

  • SHA512

    261536da3ced9234ac6893eaf22189a6b344e7e09f6a328517eabebbd69878d1568a03a6c26049ecee9e92275d30e3a7b6ea05106651065831f8b8a673ae01a8

  • SSDEEP

    3072:Rkggw5DyrMgADAYFYPt+KpJc2pNf9LfuiHf8:rArUDF34hpXLuwf8

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ba351a64b455226c4d87f7dd3e4413c75c0cb7c13a03e70e422d3d33adf7b5f0N.exe

    • Size

      120KB

    • MD5

      3242d7f5a760f33cdfa83eb8a5fce020

    • SHA1

      d2f1f9cea8f83774f53eddf45c9f62c67d5168be

    • SHA256

      ba351a64b455226c4d87f7dd3e4413c75c0cb7c13a03e70e422d3d33adf7b5f0

    • SHA512

      261536da3ced9234ac6893eaf22189a6b344e7e09f6a328517eabebbd69878d1568a03a6c26049ecee9e92275d30e3a7b6ea05106651065831f8b8a673ae01a8

    • SSDEEP

      3072:Rkggw5DyrMgADAYFYPt+KpJc2pNf9LfuiHf8:rArUDF34hpXLuwf8

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks