General

  • Target

    9f996b054365cbce6af60ffbccc080f6a433a85edfbe32cea007b88b19a809dcN.exe

  • Size

    120KB

  • Sample

    241216-jx5jda1qay

  • MD5

    80c73ea0ffcd305d04e7900f37b765f0

  • SHA1

    17ececc4c9b8e4118c5d5d53a8fc4bb443473ac1

  • SHA256

    9f996b054365cbce6af60ffbccc080f6a433a85edfbe32cea007b88b19a809dc

  • SHA512

    72e8a81f24e51236fa7085d908f9959f1ea22e6d28860eecb6595674f682ce14bb4711f1d9b5ae0bc4264e361e274c3b6acf8ff5e8bc2bead0abc6fa7e3dbc9c

  • SSDEEP

    3072:PCvnBRWoAAMs+c9oWNDf4/PUKPAqKj1zspZV:PW3MszoWVIcLjuV

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      9f996b054365cbce6af60ffbccc080f6a433a85edfbe32cea007b88b19a809dcN.exe

    • Size

      120KB

    • MD5

      80c73ea0ffcd305d04e7900f37b765f0

    • SHA1

      17ececc4c9b8e4118c5d5d53a8fc4bb443473ac1

    • SHA256

      9f996b054365cbce6af60ffbccc080f6a433a85edfbe32cea007b88b19a809dc

    • SHA512

      72e8a81f24e51236fa7085d908f9959f1ea22e6d28860eecb6595674f682ce14bb4711f1d9b5ae0bc4264e361e274c3b6acf8ff5e8bc2bead0abc6fa7e3dbc9c

    • SSDEEP

      3072:PCvnBRWoAAMs+c9oWNDf4/PUKPAqKj1zspZV:PW3MszoWVIcLjuV

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks