General

  • Target

    be4758086b302ce76f93774cd4a1207a422f7573d9ff5acdbd3742b3250f9e0fN.exe

  • Size

    120KB

  • Sample

    241216-hm6g9ayqdw

  • MD5

    e6046419ecfbcc2358d66df1f7240760

  • SHA1

    e518f354cf4559aa56ac2822f34af73540cf944d

  • SHA256

    be4758086b302ce76f93774cd4a1207a422f7573d9ff5acdbd3742b3250f9e0f

  • SHA512

    bda8fd37375225db54f978cfacb4ec3eb0be206ab7b9d19675b971c6f24e06056b8a6f51b6c44b14619e23816cc8b9ff3ef62381bc1cd3f349b12e8ed1fc7205

  • SSDEEP

    1536:KIwjKKWa2r6U1dVKpQ/uc/RHPX2z1l6EKcXMMsKEo+NrpOlaEcRIX2Z:KIwd2hJK+T/JPmzeEKc/sKsro1c2m

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      be4758086b302ce76f93774cd4a1207a422f7573d9ff5acdbd3742b3250f9e0fN.exe

    • Size

      120KB

    • MD5

      e6046419ecfbcc2358d66df1f7240760

    • SHA1

      e518f354cf4559aa56ac2822f34af73540cf944d

    • SHA256

      be4758086b302ce76f93774cd4a1207a422f7573d9ff5acdbd3742b3250f9e0f

    • SHA512

      bda8fd37375225db54f978cfacb4ec3eb0be206ab7b9d19675b971c6f24e06056b8a6f51b6c44b14619e23816cc8b9ff3ef62381bc1cd3f349b12e8ed1fc7205

    • SSDEEP

      1536:KIwjKKWa2r6U1dVKpQ/uc/RHPX2z1l6EKcXMMsKEo+NrpOlaEcRIX2Z:KIwd2hJK+T/JPmzeEKc/sKsro1c2m

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks