General

  • Target

    4d0a4dcdeec04f7c52348917d43e012e6665ca090ad25a5ba9cb844f3d8f8a00.exe

  • Size

    120KB

  • Sample

    241216-28h4matpbr

  • MD5

    317c2b9be6c98f56457d0f8cb3fd41b7

  • SHA1

    e5ea097b408ff0dbeed5f8ae644096e60c5ac9b1

  • SHA256

    4d0a4dcdeec04f7c52348917d43e012e6665ca090ad25a5ba9cb844f3d8f8a00

  • SHA512

    61c6382f829e33b862c99ef019605e5acb9d26e0ce1c105b1846f3dd0ff432a64933fc6e6dd6055ef18d08b0695683d15796a130bf239942b7a31f091fd9dab7

  • SSDEEP

    3072:jJUAM5JRCZomxeNa0G0jwM8Oj1MD1fMvYhk7O5Er:NU7jRbmxea0G0jC1fxC3

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4d0a4dcdeec04f7c52348917d43e012e6665ca090ad25a5ba9cb844f3d8f8a00.exe

    • Size

      120KB

    • MD5

      317c2b9be6c98f56457d0f8cb3fd41b7

    • SHA1

      e5ea097b408ff0dbeed5f8ae644096e60c5ac9b1

    • SHA256

      4d0a4dcdeec04f7c52348917d43e012e6665ca090ad25a5ba9cb844f3d8f8a00

    • SHA512

      61c6382f829e33b862c99ef019605e5acb9d26e0ce1c105b1846f3dd0ff432a64933fc6e6dd6055ef18d08b0695683d15796a130bf239942b7a31f091fd9dab7

    • SSDEEP

      3072:jJUAM5JRCZomxeNa0G0jwM8Oj1MD1fMvYhk7O5Er:NU7jRbmxea0G0jC1fxC3

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks