General

  • Target

    21ade9082ee6cc085f4927c9b37d443c5e21dc5272d79c5d81e8bd7b697f7966N.exe

  • Size

    120KB

  • Sample

    241216-jmvana1ldx

  • MD5

    1a1121f9a9562e16a2f430db970f6d90

  • SHA1

    b30285d96c518740d8bee5665658e884c71e51fb

  • SHA256

    21ade9082ee6cc085f4927c9b37d443c5e21dc5272d79c5d81e8bd7b697f7966

  • SHA512

    1b53e1c161e3c2b2022143943da756241aa2b9b8a6db68fdd65c86fabc262cbd8e8b99a5c1129ff3b2e3da2d0542202e279b94f0f6994ea1711ab2f598770a0a

  • SSDEEP

    1536:YnDM+hMW4dXsXiTiUjtH5YCFJ2JtOf3Qjmq+9lJxAp99Tmp8:YDMbW4UUjjgjOfYmZ9rxAp99Kp

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      21ade9082ee6cc085f4927c9b37d443c5e21dc5272d79c5d81e8bd7b697f7966N.exe

    • Size

      120KB

    • MD5

      1a1121f9a9562e16a2f430db970f6d90

    • SHA1

      b30285d96c518740d8bee5665658e884c71e51fb

    • SHA256

      21ade9082ee6cc085f4927c9b37d443c5e21dc5272d79c5d81e8bd7b697f7966

    • SHA512

      1b53e1c161e3c2b2022143943da756241aa2b9b8a6db68fdd65c86fabc262cbd8e8b99a5c1129ff3b2e3da2d0542202e279b94f0f6994ea1711ab2f598770a0a

    • SSDEEP

      1536:YnDM+hMW4dXsXiTiUjtH5YCFJ2JtOf3Qjmq+9lJxAp99Tmp8:YDMbW4UUjjgjOfYmZ9rxAp99Kp

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks