General

  • Target

    603ffc8436068a884515537e09341611fb49b59065b54dc61d18a3be1dfc4c53N.exe

  • Size

    65KB

  • Sample

    241216-e28z5stqbt

  • MD5

    50dd6f99bba8604958b6a5ceb3472190

  • SHA1

    c116bba5f2affa14cb9664ad2a21667a71bee4b2

  • SHA256

    603ffc8436068a884515537e09341611fb49b59065b54dc61d18a3be1dfc4c53

  • SHA512

    19479143f0c5b2fb2c817ec9a43f4777a0b9bc1bfa03d73aaea3d7ddb2a625c55005bf48478b556f5db5258cee63b4196f5b5bae4bc47a9f788e0cc34aaadc27

  • SSDEEP

    1536:eBmAahaIqdlB5JayJEBMfB/VjjZtwP6MkeF6KCde84rO02:bAaa/5JMAFV3ZWlki6irO02

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      603ffc8436068a884515537e09341611fb49b59065b54dc61d18a3be1dfc4c53N.exe

    • Size

      65KB

    • MD5

      50dd6f99bba8604958b6a5ceb3472190

    • SHA1

      c116bba5f2affa14cb9664ad2a21667a71bee4b2

    • SHA256

      603ffc8436068a884515537e09341611fb49b59065b54dc61d18a3be1dfc4c53

    • SHA512

      19479143f0c5b2fb2c817ec9a43f4777a0b9bc1bfa03d73aaea3d7ddb2a625c55005bf48478b556f5db5258cee63b4196f5b5bae4bc47a9f788e0cc34aaadc27

    • SSDEEP

      1536:eBmAahaIqdlB5JayJEBMfB/VjjZtwP6MkeF6KCde84rO02:bAaa/5JMAFV3ZWlki6irO02

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks