General

  • Target

    dc56303eaeb0f8c9e00bff033a5cf9e154cc9b04ad155731d65eab8f3dee7e33N.exe

  • Size

    1.4MB

  • Sample

    241216-f8ewbawnh1

  • MD5

    71a4f24f6a85a19d3bce8062e2d67f50

  • SHA1

    182cacf3cb760494b48b4301623260d70a50b570

  • SHA256

    dc56303eaeb0f8c9e00bff033a5cf9e154cc9b04ad155731d65eab8f3dee7e33

  • SHA512

    3a195e8b29ab3b9a51be79b5fe4ba451975b84aeaf9e0c96a485b7782383aff31363c83af822586f96d21ed178a73ad14058e103cfe2aeb760202923399b4abc

  • SSDEEP

    24576:NjWvuK6VGQVOpu2LBOuJW125OLfjOVuOpwDLriIQUOcm8s:Nu6aHBhJW12szK07LWIQa3s

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      dc56303eaeb0f8c9e00bff033a5cf9e154cc9b04ad155731d65eab8f3dee7e33N.exe

    • Size

      1.4MB

    • MD5

      71a4f24f6a85a19d3bce8062e2d67f50

    • SHA1

      182cacf3cb760494b48b4301623260d70a50b570

    • SHA256

      dc56303eaeb0f8c9e00bff033a5cf9e154cc9b04ad155731d65eab8f3dee7e33

    • SHA512

      3a195e8b29ab3b9a51be79b5fe4ba451975b84aeaf9e0c96a485b7782383aff31363c83af822586f96d21ed178a73ad14058e103cfe2aeb760202923399b4abc

    • SSDEEP

      24576:NjWvuK6VGQVOpu2LBOuJW125OLfjOVuOpwDLriIQUOcm8s:Nu6aHBhJW12szK07LWIQa3s

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks