General

  • Target

    05aa9ee664e69fcf012d23f546b3f48c140b688c93c22a47cdae2a5121806abaN.exe

  • Size

    120KB

  • Sample

    241216-kdvqhasmcv

  • MD5

    0b803c458c6967d987b849a934426ff0

  • SHA1

    c318baa55beeb298e4fe0282ca3e1616db2d9831

  • SHA256

    05aa9ee664e69fcf012d23f546b3f48c140b688c93c22a47cdae2a5121806aba

  • SHA512

    8f0e558cfc72104264779418f156aff4078813c4010fbcff4ee03d749d35e8259caa2667df2ae8109837e78aeed9811aefa70cd01cdf58d8e7a002d292a3563d

  • SSDEEP

    3072:3bXdAKYuDJinnuBaAeVQc9JnO3MbzRGZEXg:3DdAKvDJinHJVvnEMMZEw

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      05aa9ee664e69fcf012d23f546b3f48c140b688c93c22a47cdae2a5121806abaN.exe

    • Size

      120KB

    • MD5

      0b803c458c6967d987b849a934426ff0

    • SHA1

      c318baa55beeb298e4fe0282ca3e1616db2d9831

    • SHA256

      05aa9ee664e69fcf012d23f546b3f48c140b688c93c22a47cdae2a5121806aba

    • SHA512

      8f0e558cfc72104264779418f156aff4078813c4010fbcff4ee03d749d35e8259caa2667df2ae8109837e78aeed9811aefa70cd01cdf58d8e7a002d292a3563d

    • SSDEEP

      3072:3bXdAKYuDJinnuBaAeVQc9JnO3MbzRGZEXg:3DdAKvDJinHJVvnEMMZEw

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks