General

  • Target

    1dfada41083d3a3f8390120c7d402636c1983e3870cff2962e08b10aab5aaadc.exe

  • Size

    120KB

  • Sample

    241216-18xfks1rav

  • MD5

    45aa6febc3a89e5271faf9fac8a0d591

  • SHA1

    dcafd896c71e5441c23282c89db9219917840e29

  • SHA256

    1dfada41083d3a3f8390120c7d402636c1983e3870cff2962e08b10aab5aaadc

  • SHA512

    fd6e5eef12c1e483cd69ce2e541d5cb3be0764b564b72fcac71966a88e590559107b8f7e2b83b9ebdc1ac460df86afe2143445f33911fe5102eee6dc74f76fc8

  • SSDEEP

    1536:2HNmz46IQB9nPQA6qCvFXVTLh+acQNyZYBS00hFpl5EsnSRItDioQ0jYSbRACpd:Q04JQBq1VnhIQBB0d59SRaioDjYSbqCD

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1dfada41083d3a3f8390120c7d402636c1983e3870cff2962e08b10aab5aaadc.exe

    • Size

      120KB

    • MD5

      45aa6febc3a89e5271faf9fac8a0d591

    • SHA1

      dcafd896c71e5441c23282c89db9219917840e29

    • SHA256

      1dfada41083d3a3f8390120c7d402636c1983e3870cff2962e08b10aab5aaadc

    • SHA512

      fd6e5eef12c1e483cd69ce2e541d5cb3be0764b564b72fcac71966a88e590559107b8f7e2b83b9ebdc1ac460df86afe2143445f33911fe5102eee6dc74f76fc8

    • SSDEEP

      1536:2HNmz46IQB9nPQA6qCvFXVTLh+acQNyZYBS00hFpl5EsnSRItDioQ0jYSbRACpd:Q04JQBq1VnhIQBB0d59SRaioDjYSbqCD

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks