General

  • Target

    ecb25fc7ee55e3b992a414f10273a37703f93b75209612aa38e51214593274c4N.exe

  • Size

    120KB

  • Sample

    241216-nmq1fsymax

  • MD5

    0a4003302c5d1779496bb58c5f3600e0

  • SHA1

    06210e11f0e4e62ca6876463fa4a6fa181e96e00

  • SHA256

    ecb25fc7ee55e3b992a414f10273a37703f93b75209612aa38e51214593274c4

  • SHA512

    7414f3566e23d376989ad8e567fd85240b79e7dd8935bd9a7c6ac08cc0796bab907f279cd480700abde5bfbcc80d59ab9b4659723ef2d25063d520ebfdc88d7b

  • SSDEEP

    1536:LogSzUh2pJZipYlnx0abSyFN7Ot1ZXp1BZ314CZVXMFP/NgScb93bT11hC0RyDBm:3Szp7m4nxVlNqXfL14CxSwP1/XaBIB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ecb25fc7ee55e3b992a414f10273a37703f93b75209612aa38e51214593274c4N.exe

    • Size

      120KB

    • MD5

      0a4003302c5d1779496bb58c5f3600e0

    • SHA1

      06210e11f0e4e62ca6876463fa4a6fa181e96e00

    • SHA256

      ecb25fc7ee55e3b992a414f10273a37703f93b75209612aa38e51214593274c4

    • SHA512

      7414f3566e23d376989ad8e567fd85240b79e7dd8935bd9a7c6ac08cc0796bab907f279cd480700abde5bfbcc80d59ab9b4659723ef2d25063d520ebfdc88d7b

    • SSDEEP

      1536:LogSzUh2pJZipYlnx0abSyFN7Ot1ZXp1BZ314CZVXMFP/NgScb93bT11hC0RyDBm:3Szp7m4nxVlNqXfL14CxSwP1/XaBIB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks