General

  • Target

    a9918aef775c477acdbb0a9ec35c1fcd843feeec97d8ea74b67d771ab46395a2N.exe

  • Size

    120KB

  • Sample

    241216-23q72ssphw

  • MD5

    45ed632c5a5bd3d21c796625496b8ad0

  • SHA1

    a38d1a725cd53bc232d6229ca5c6648ffde3d0c0

  • SHA256

    a9918aef775c477acdbb0a9ec35c1fcd843feeec97d8ea74b67d771ab46395a2

  • SHA512

    0f0aac942eea42bbb985a740986071d78e5bfbdefdd1733f83fb98da5eb7a83776d097c72e11569159b849020632572054b23870b2aa7f2df63faf30dce207f2

  • SSDEEP

    3072:2xMmFcHmvcN6OzxwU0SlXsAPwUGwa7BHoMU9:wJF2cCwU05awaaZjU9

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a9918aef775c477acdbb0a9ec35c1fcd843feeec97d8ea74b67d771ab46395a2N.exe

    • Size

      120KB

    • MD5

      45ed632c5a5bd3d21c796625496b8ad0

    • SHA1

      a38d1a725cd53bc232d6229ca5c6648ffde3d0c0

    • SHA256

      a9918aef775c477acdbb0a9ec35c1fcd843feeec97d8ea74b67d771ab46395a2

    • SHA512

      0f0aac942eea42bbb985a740986071d78e5bfbdefdd1733f83fb98da5eb7a83776d097c72e11569159b849020632572054b23870b2aa7f2df63faf30dce207f2

    • SSDEEP

      3072:2xMmFcHmvcN6OzxwU0SlXsAPwUGwa7BHoMU9:wJF2cCwU05awaaZjU9

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks