General

  • Target

    b888173d24ce5d7257900df7577297f88bf1e40dee52e5ede725a541f4316d35N.exe

  • Size

    120KB

  • Sample

    241216-nnq2vaymdx

  • MD5

    b86450a58045ecaa12bbd0097e83d580

  • SHA1

    2909fb0dd5739d775be4e924dbe987c432068798

  • SHA256

    b888173d24ce5d7257900df7577297f88bf1e40dee52e5ede725a541f4316d35

  • SHA512

    15caed3f221a52399ba101cf163160eeae00595bd350092f1590f9ff689b491fdb6115825f30b9d18fbe1ca88164e5c2e51811d9d95b3be6a47f6c76257eeead

  • SSDEEP

    3072:5hog/V8ArPx1M+pUpgrZINv9WjeChfJ7wYnsqaerb+aITVu:J/Ggx1M+pUiUFcNhfJ84sTef7IT

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      b888173d24ce5d7257900df7577297f88bf1e40dee52e5ede725a541f4316d35N.exe

    • Size

      120KB

    • MD5

      b86450a58045ecaa12bbd0097e83d580

    • SHA1

      2909fb0dd5739d775be4e924dbe987c432068798

    • SHA256

      b888173d24ce5d7257900df7577297f88bf1e40dee52e5ede725a541f4316d35

    • SHA512

      15caed3f221a52399ba101cf163160eeae00595bd350092f1590f9ff689b491fdb6115825f30b9d18fbe1ca88164e5c2e51811d9d95b3be6a47f6c76257eeead

    • SSDEEP

      3072:5hog/V8ArPx1M+pUpgrZINv9WjeChfJ7wYnsqaerb+aITVu:J/Ggx1M+pUiUFcNhfJ84sTef7IT

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks