General

  • Target

    df92a92425260e9c28009a76bc2a9cc9ab812c92771131f0243e2f3824553ea7N.exe

  • Size

    120KB

  • Sample

    241216-acfvvavrap

  • MD5

    88f29dfb98f1b3871c2e2becd5bc2870

  • SHA1

    f3aeb0a8c7ec723710f8c90bf4a0f99d8e4f8ff7

  • SHA256

    df92a92425260e9c28009a76bc2a9cc9ab812c92771131f0243e2f3824553ea7

  • SHA512

    430d1d2296bb3237ae4ac3fadcfef7744a5545f9cf37846d378c3613e8c078cc7935df034d6ece5cab134fe3682e5f34a24f9a1db166e55224cc17c9f064a682

  • SSDEEP

    1536:XAbzO76H7DNgZMpmt1MNPdZNhixGFzWLzLxrdxXGEFUm/imVgteWYqMZ7U:gpH7DNrIfMVdHhhFwPxvXGPmVgeZH

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      df92a92425260e9c28009a76bc2a9cc9ab812c92771131f0243e2f3824553ea7N.exe

    • Size

      120KB

    • MD5

      88f29dfb98f1b3871c2e2becd5bc2870

    • SHA1

      f3aeb0a8c7ec723710f8c90bf4a0f99d8e4f8ff7

    • SHA256

      df92a92425260e9c28009a76bc2a9cc9ab812c92771131f0243e2f3824553ea7

    • SHA512

      430d1d2296bb3237ae4ac3fadcfef7744a5545f9cf37846d378c3613e8c078cc7935df034d6ece5cab134fe3682e5f34a24f9a1db166e55224cc17c9f064a682

    • SSDEEP

      1536:XAbzO76H7DNgZMpmt1MNPdZNhixGFzWLzLxrdxXGEFUm/imVgteWYqMZ7U:gpH7DNrIfMVdHhhFwPxvXGPmVgeZH

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks