General

  • Target

    5b48b4bd8d84759d387a3d686c9a0d3458171f02744bb3a0d2b9941b2aa4f4d9N.exe

  • Size

    120KB

  • Sample

    241216-a1b7kaxjap

  • MD5

    bc3eb46b1a1afaa42cf91e27e6294630

  • SHA1

    9a766f8e4a8891637a5cebbd81e585e2cec70463

  • SHA256

    5b48b4bd8d84759d387a3d686c9a0d3458171f02744bb3a0d2b9941b2aa4f4d9

  • SHA512

    e687c3d705b308843921437d6f083e8fe4312b0a9b6c8a418c5d9ef322662be70c4d7733467c94755ed2ecf16580ed585f7473b254d7ebd616957947b3ad84c5

  • SSDEEP

    3072:1Rah7R7qX7SsGEpWgzfHYhTh3lq1oDiqLsXZEqIs:1y7JHsRlfi1lqTqQZEqIs

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      5b48b4bd8d84759d387a3d686c9a0d3458171f02744bb3a0d2b9941b2aa4f4d9N.exe

    • Size

      120KB

    • MD5

      bc3eb46b1a1afaa42cf91e27e6294630

    • SHA1

      9a766f8e4a8891637a5cebbd81e585e2cec70463

    • SHA256

      5b48b4bd8d84759d387a3d686c9a0d3458171f02744bb3a0d2b9941b2aa4f4d9

    • SHA512

      e687c3d705b308843921437d6f083e8fe4312b0a9b6c8a418c5d9ef322662be70c4d7733467c94755ed2ecf16580ed585f7473b254d7ebd616957947b3ad84c5

    • SSDEEP

      3072:1Rah7R7qX7SsGEpWgzfHYhTh3lq1oDiqLsXZEqIs:1y7JHsRlfi1lqTqQZEqIs

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks