General

  • Target

    010939362fa50cca694402dc308593faee70561953d6654de0fd91519e76a589N.exe

  • Size

    120KB

  • Sample

    241216-fyfd4awkhv

  • MD5

    6212a7dfe74fa4f35b5b368f19e0bee0

  • SHA1

    d8fb44eb555818bca32cd14a812df7a896744133

  • SHA256

    010939362fa50cca694402dc308593faee70561953d6654de0fd91519e76a589

  • SHA512

    ef8cf4ff01a1499323abd77754db9745204e3ed522fe69a3ff0de50845367cba026798d0964e475f051dbc73d342709a7345b91ea51849de4104b8a0f39ba29a

  • SSDEEP

    1536:fcu9NK+ix/93K03rmRh5X+mR7Lzgxe286Os9mKPlyk56aLB5Ac:fcuvK+kF6Aw73YMmPlykgadGc

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      010939362fa50cca694402dc308593faee70561953d6654de0fd91519e76a589N.exe

    • Size

      120KB

    • MD5

      6212a7dfe74fa4f35b5b368f19e0bee0

    • SHA1

      d8fb44eb555818bca32cd14a812df7a896744133

    • SHA256

      010939362fa50cca694402dc308593faee70561953d6654de0fd91519e76a589

    • SHA512

      ef8cf4ff01a1499323abd77754db9745204e3ed522fe69a3ff0de50845367cba026798d0964e475f051dbc73d342709a7345b91ea51849de4104b8a0f39ba29a

    • SSDEEP

      1536:fcu9NK+ix/93K03rmRh5X+mR7Lzgxe286Os9mKPlyk56aLB5Ac:fcuvK+kF6Aw73YMmPlykgadGc

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks