General

  • Target

    d2aa1725106306f2c399bbfde6c8c1582bb7b0fd4014bf7d348e4cb9341b203dN.exe

  • Size

    120KB

  • Sample

    241216-1cn5bs1jbt

  • MD5

    8d5f5f50488eb03b91c40cf227544520

  • SHA1

    c80877d0f34a0a73afae2a6276693b7865c7d6c0

  • SHA256

    d2aa1725106306f2c399bbfde6c8c1582bb7b0fd4014bf7d348e4cb9341b203d

  • SHA512

    81f3b5696cb0a3d31d7d44560f58549a8010b1dab8dca75f03edc3563fac31f885f1a3ba5cb8f95a43b345da089d169b262915b72e1553acd8a70da3b2d37fe0

  • SSDEEP

    1536:kevW5nAOIu8sSfL6DcNvFmXXyTp+o1Hk5Utt8funBoAp13Uxy5Nn6:bvW5n7CftIe58at8fmoArUWNn

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d2aa1725106306f2c399bbfde6c8c1582bb7b0fd4014bf7d348e4cb9341b203dN.exe

    • Size

      120KB

    • MD5

      8d5f5f50488eb03b91c40cf227544520

    • SHA1

      c80877d0f34a0a73afae2a6276693b7865c7d6c0

    • SHA256

      d2aa1725106306f2c399bbfde6c8c1582bb7b0fd4014bf7d348e4cb9341b203d

    • SHA512

      81f3b5696cb0a3d31d7d44560f58549a8010b1dab8dca75f03edc3563fac31f885f1a3ba5cb8f95a43b345da089d169b262915b72e1553acd8a70da3b2d37fe0

    • SSDEEP

      1536:kevW5nAOIu8sSfL6DcNvFmXXyTp+o1Hk5Utt8funBoAp13Uxy5Nn6:bvW5n7CftIe58at8fmoArUWNn

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks