General

  • Target

    55a3b5d40fcf51df8709245c8947afe11e055a6b98f0f3f314a6ef4bb3a9f636N.exe

  • Size

    65KB

  • Sample

    241216-fgmrvawphj

  • MD5

    2f98db531296c984cfd6963a3b22bac0

  • SHA1

    b28993f850d87fc1a069d663d999e6675991fb5f

  • SHA256

    55a3b5d40fcf51df8709245c8947afe11e055a6b98f0f3f314a6ef4bb3a9f636

  • SHA512

    246abfcb243ab30795cea28cb0820bc2a0cebf5b9d7dc5e7c439525b63b9da9a623e349dfde8e437dcbd3cab47a7a397778ade7d5876c9162e707d619782e8e2

  • SSDEEP

    1536:T32vQhyTg4uGFjYhA/RwZEcL1AffcEcrp8dIKkgoYtH/8v50Ta:TP0Tx9FjYW/0fxAXcEcVfnYBk+Ta

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      55a3b5d40fcf51df8709245c8947afe11e055a6b98f0f3f314a6ef4bb3a9f636N.exe

    • Size

      65KB

    • MD5

      2f98db531296c984cfd6963a3b22bac0

    • SHA1

      b28993f850d87fc1a069d663d999e6675991fb5f

    • SHA256

      55a3b5d40fcf51df8709245c8947afe11e055a6b98f0f3f314a6ef4bb3a9f636

    • SHA512

      246abfcb243ab30795cea28cb0820bc2a0cebf5b9d7dc5e7c439525b63b9da9a623e349dfde8e437dcbd3cab47a7a397778ade7d5876c9162e707d619782e8e2

    • SSDEEP

      1536:T32vQhyTg4uGFjYhA/RwZEcL1AffcEcrp8dIKkgoYtH/8v50Ta:TP0Tx9FjYW/0fxAXcEcVfnYBk+Ta

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks