General

  • Target

    b066f1b0618fd89fd4ce292856a01eb22b836e4591e7b46b101b62f5cfacf202N.exe

  • Size

    120KB

  • Sample

    241216-lqmq4awlel

  • MD5

    b4883653254804f6697911663cd86f30

  • SHA1

    914095fdddfa5c5d5c8416daf777436a43492fe8

  • SHA256

    b066f1b0618fd89fd4ce292856a01eb22b836e4591e7b46b101b62f5cfacf202

  • SHA512

    a542654aa45c6ba584802260086b35c67ba26739423f6922fb217a202c53841c546f02552f5f0bb092e0586a3a5bfc2fd9119f859457caa256652fb0bf030e6c

  • SSDEEP

    1536:J0G8LCA22JjSJGLVhGDktWsDkYk6fJH5WzNrh1JUuzWLnKRjUb2nz/Z+IhQes1vu:kCYJ2o5A4W8kYHJqrh12O6ejD/Yb0o7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      b066f1b0618fd89fd4ce292856a01eb22b836e4591e7b46b101b62f5cfacf202N.exe

    • Size

      120KB

    • MD5

      b4883653254804f6697911663cd86f30

    • SHA1

      914095fdddfa5c5d5c8416daf777436a43492fe8

    • SHA256

      b066f1b0618fd89fd4ce292856a01eb22b836e4591e7b46b101b62f5cfacf202

    • SHA512

      a542654aa45c6ba584802260086b35c67ba26739423f6922fb217a202c53841c546f02552f5f0bb092e0586a3a5bfc2fd9119f859457caa256652fb0bf030e6c

    • SSDEEP

      1536:J0G8LCA22JjSJGLVhGDktWsDkYk6fJH5WzNrh1JUuzWLnKRjUb2nz/Z+IhQes1vu:kCYJ2o5A4W8kYHJqrh12O6ejD/Yb0o7

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks