General

  • Target

    bbd616866260e8dfdc892f3f679fcac7995c9eb15100a48d4df213743c24a6be.exe

  • Size

    120KB

  • Sample

    241216-16282s1qez

  • MD5

    eba23d1639ce02c3aa35366db3df053f

  • SHA1

    5f600a8b7244d9f76589b90e2158034a2abebe2e

  • SHA256

    bbd616866260e8dfdc892f3f679fcac7995c9eb15100a48d4df213743c24a6be

  • SHA512

    5527b4cb41c64b2ccb730a6bd3cb66007d50b134b18fb6c77c4869d09503c050df8816f1de79d8c770d40fd844b0579d94dfe83016fff9a4301fa9ca2268022a

  • SSDEEP

    3072:eewJuzPRfTMRMncuSjhsA0DkeD2XdL1P6J64O:e1JujBIRMnJmOKe+VQO

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      bbd616866260e8dfdc892f3f679fcac7995c9eb15100a48d4df213743c24a6be.exe

    • Size

      120KB

    • MD5

      eba23d1639ce02c3aa35366db3df053f

    • SHA1

      5f600a8b7244d9f76589b90e2158034a2abebe2e

    • SHA256

      bbd616866260e8dfdc892f3f679fcac7995c9eb15100a48d4df213743c24a6be

    • SHA512

      5527b4cb41c64b2ccb730a6bd3cb66007d50b134b18fb6c77c4869d09503c050df8816f1de79d8c770d40fd844b0579d94dfe83016fff9a4301fa9ca2268022a

    • SSDEEP

      3072:eewJuzPRfTMRMncuSjhsA0DkeD2XdL1P6J64O:e1JujBIRMnJmOKe+VQO

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks