General

  • Target

    bb4cc5f2483b2562be20884e12b0fa7cd663569c3aab43d82135b9931a05115aN.exe

  • Size

    120KB

  • Sample

    241216-dm23ls1mbw

  • MD5

    8d0654684c4ec61a0651f9e444dfd920

  • SHA1

    49120879e5e0df140af107e3c3fed67baa4f60c0

  • SHA256

    bb4cc5f2483b2562be20884e12b0fa7cd663569c3aab43d82135b9931a05115a

  • SHA512

    087e9136ac1b73d6123cc2678e09be4ca6b7e11520d7e2b47ce0619595d48f4245476523883cccc16f6f4fcf3cf5088751658b15e60c832f641a4faeb6ea9495

  • SSDEEP

    1536:vc8Uy6knBPBFMZGT/D5xlc8Qg4tiaeIVlE8/NubeLWuYk4/tUNnRz/ipmgs:vc8D6knphT/D5ozg4hu8/CRqNZH

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      bb4cc5f2483b2562be20884e12b0fa7cd663569c3aab43d82135b9931a05115aN.exe

    • Size

      120KB

    • MD5

      8d0654684c4ec61a0651f9e444dfd920

    • SHA1

      49120879e5e0df140af107e3c3fed67baa4f60c0

    • SHA256

      bb4cc5f2483b2562be20884e12b0fa7cd663569c3aab43d82135b9931a05115a

    • SHA512

      087e9136ac1b73d6123cc2678e09be4ca6b7e11520d7e2b47ce0619595d48f4245476523883cccc16f6f4fcf3cf5088751658b15e60c832f641a4faeb6ea9495

    • SSDEEP

      1536:vc8Uy6knBPBFMZGT/D5xlc8Qg4tiaeIVlE8/NubeLWuYk4/tUNnRz/ipmgs:vc8D6knphT/D5ozg4hu8/CRqNZH

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks