General

  • Target

    36e7ae2f92747d051dc0bddbedd7acb23e7fe903aa2672fbcaef0f03a02b3f29N.exe

  • Size

    120KB

  • Sample

    241216-1qqv3s1lhv

  • MD5

    129ddc7efb942bd13c2c486cf22bf040

  • SHA1

    809be6d5def886866190be7886b9a02dcb8bd2a4

  • SHA256

    36e7ae2f92747d051dc0bddbedd7acb23e7fe903aa2672fbcaef0f03a02b3f29

  • SHA512

    453fd7c8c2a08f8dc09c628482f334f7f215003cafa76e45aac054a83869da43db8faa4a4762290477608ccdfb5474774d73b9ca0c462970df6ada12ace30b60

  • SSDEEP

    1536:jNbQoxG1yQAVrvenhJ+VJL/nL+hyzL8Nw1cT4DePwmSLGneQqfO:jNcEG1Mrv4hJStL+hyX8i8PwmSL8qG

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      36e7ae2f92747d051dc0bddbedd7acb23e7fe903aa2672fbcaef0f03a02b3f29N.exe

    • Size

      120KB

    • MD5

      129ddc7efb942bd13c2c486cf22bf040

    • SHA1

      809be6d5def886866190be7886b9a02dcb8bd2a4

    • SHA256

      36e7ae2f92747d051dc0bddbedd7acb23e7fe903aa2672fbcaef0f03a02b3f29

    • SHA512

      453fd7c8c2a08f8dc09c628482f334f7f215003cafa76e45aac054a83869da43db8faa4a4762290477608ccdfb5474774d73b9ca0c462970df6ada12ace30b60

    • SSDEEP

      1536:jNbQoxG1yQAVrvenhJ+VJL/nL+hyzL8Nw1cT4DePwmSLGneQqfO:jNcEG1Mrv4hJStL+hyX8i8PwmSL8qG

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks