General

  • Target

    fb43e78ccfdfa1c3e466efa7d82230270eee3e92d9d1ac46ef2f79237acf1d0aN.exe

  • Size

    120KB

  • Sample

    241215-2t6w5s1lfx

  • MD5

    e52b7af8610c08a7e6373c2c82c2dd50

  • SHA1

    b30da47970389775fc5c5f839169b3e92fad543e

  • SHA256

    fb43e78ccfdfa1c3e466efa7d82230270eee3e92d9d1ac46ef2f79237acf1d0a

  • SHA512

    fb90176288b74f41a2e74551000c9311a92a105cb36db9f47e30bab0d841162c7f1888e23dfbf2a5778b48cc944bdcc46998a9135810844c0ad15ab7e14d1289

  • SSDEEP

    1536:/A7r/+1mKCU80K6kL/5VyHrtquOkuoq5MS8NB4+E95oCS:C+p1kLit/Ol8lGf

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      fb43e78ccfdfa1c3e466efa7d82230270eee3e92d9d1ac46ef2f79237acf1d0aN.exe

    • Size

      120KB

    • MD5

      e52b7af8610c08a7e6373c2c82c2dd50

    • SHA1

      b30da47970389775fc5c5f839169b3e92fad543e

    • SHA256

      fb43e78ccfdfa1c3e466efa7d82230270eee3e92d9d1ac46ef2f79237acf1d0a

    • SHA512

      fb90176288b74f41a2e74551000c9311a92a105cb36db9f47e30bab0d841162c7f1888e23dfbf2a5778b48cc944bdcc46998a9135810844c0ad15ab7e14d1289

    • SSDEEP

      1536:/A7r/+1mKCU80K6kL/5VyHrtquOkuoq5MS8NB4+E95oCS:C+p1kLit/Ol8lGf

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks