General

  • Target

    424310c8d96f7510c09c2b4263088543872b9d9f56b005a1ad41096c22323505N.exe

  • Size

    120KB

  • Sample

    241216-dd3msaslar

  • MD5

    d02301f1313a242f4b37b99019210830

  • SHA1

    b1742734cf1390b119e108195bbe0e466ad59a5e

  • SHA256

    424310c8d96f7510c09c2b4263088543872b9d9f56b005a1ad41096c22323505

  • SHA512

    1451a0de8b27a4880e18945d852874b884bd36d01eaa2991a0afbe4729677983fa9b7004c3e8fc908fbd2a9b4e4d4aa76d347bf64681a99445ccc328c76b7b98

  • SSDEEP

    3072:/v+1x+3wXG+GQNg/3v285fvevIEdBIeirFzBYVv:/v+1DvE/285yRTIemiR

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      424310c8d96f7510c09c2b4263088543872b9d9f56b005a1ad41096c22323505N.exe

    • Size

      120KB

    • MD5

      d02301f1313a242f4b37b99019210830

    • SHA1

      b1742734cf1390b119e108195bbe0e466ad59a5e

    • SHA256

      424310c8d96f7510c09c2b4263088543872b9d9f56b005a1ad41096c22323505

    • SHA512

      1451a0de8b27a4880e18945d852874b884bd36d01eaa2991a0afbe4729677983fa9b7004c3e8fc908fbd2a9b4e4d4aa76d347bf64681a99445ccc328c76b7b98

    • SSDEEP

      3072:/v+1x+3wXG+GQNg/3v285fvevIEdBIeirFzBYVv:/v+1DvE/285yRTIemiR

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks