General

  • Target

    4a46d942725874d6f2b1bcd81b1f13511d18ec6fc66555c90b8640ed11dffa8aN.exe

  • Size

    120KB

  • Sample

    241216-cdr1lszldk

  • MD5

    3ea8606e9583fbcb2bfe50a698d855c0

  • SHA1

    ba4eb766126675919f15e4f08144b4b83d8bca4a

  • SHA256

    4a46d942725874d6f2b1bcd81b1f13511d18ec6fc66555c90b8640ed11dffa8a

  • SHA512

    d5220799b71d37e9e9029149346587bfb87d8d56de969ab5afcdf79cc32cae47ccd56d819ef53df13e8c6075d493c698819ae3cc2cad9ba6985907fa14da2e50

  • SSDEEP

    1536:/9L3lELTLZ8E4/U1Y8Bjt5GOeFc1IiGP+AQY4yRTvO3pA/PnljrTR6qYhkzb1sH:530uEc+BfTeFtiGPEY4WOiPlj4hgb1k

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4a46d942725874d6f2b1bcd81b1f13511d18ec6fc66555c90b8640ed11dffa8aN.exe

    • Size

      120KB

    • MD5

      3ea8606e9583fbcb2bfe50a698d855c0

    • SHA1

      ba4eb766126675919f15e4f08144b4b83d8bca4a

    • SHA256

      4a46d942725874d6f2b1bcd81b1f13511d18ec6fc66555c90b8640ed11dffa8a

    • SHA512

      d5220799b71d37e9e9029149346587bfb87d8d56de969ab5afcdf79cc32cae47ccd56d819ef53df13e8c6075d493c698819ae3cc2cad9ba6985907fa14da2e50

    • SSDEEP

      1536:/9L3lELTLZ8E4/U1Y8Bjt5GOeFc1IiGP+AQY4yRTvO3pA/PnljrTR6qYhkzb1sH:530uEc+BfTeFtiGPEY4WOiPlj4hgb1k

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks