General

  • Target

    0a9b5f9ee551c20981af20431d48f84cd0d189a42dc840904f3e66e27f2a1578N.exe

  • Size

    120KB

  • Sample

    241216-2w3x9stlel

  • MD5

    6809d71ef46483a16816634399eda3c0

  • SHA1

    951d8503dc5eb2febd7738352ab73f8aa2a072ea

  • SHA256

    0a9b5f9ee551c20981af20431d48f84cd0d189a42dc840904f3e66e27f2a1578

  • SHA512

    8a44862f61a7e30229892fab6206f18eab2cf213e4ec4dd16ef443411bd24e55f2bfde5013387f72a2fcf24333571cd581aceb549a4b4bd23d39b8f0b6bc4798

  • SSDEEP

    3072:tK6ioXmfTybpc2pkjhDW/nm8GQUqx7dewAXC:cToXuTCmQiDcn5ndLGC

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0a9b5f9ee551c20981af20431d48f84cd0d189a42dc840904f3e66e27f2a1578N.exe

    • Size

      120KB

    • MD5

      6809d71ef46483a16816634399eda3c0

    • SHA1

      951d8503dc5eb2febd7738352ab73f8aa2a072ea

    • SHA256

      0a9b5f9ee551c20981af20431d48f84cd0d189a42dc840904f3e66e27f2a1578

    • SHA512

      8a44862f61a7e30229892fab6206f18eab2cf213e4ec4dd16ef443411bd24e55f2bfde5013387f72a2fcf24333571cd581aceb549a4b4bd23d39b8f0b6bc4798

    • SSDEEP

      3072:tK6ioXmfTybpc2pkjhDW/nm8GQUqx7dewAXC:cToXuTCmQiDcn5ndLGC

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks