General

  • Target

    1a8fc50d24bc7f0f5b7e206119d4985bc2d142a1d35c7936cc350d730c971816N.exe

  • Size

    120KB

  • Sample

    241216-p2zrks1qgm

  • MD5

    ad3bb5b5eb9532a608162e96f0747400

  • SHA1

    3188eb793636086063f5f4ed7ef95470165ed304

  • SHA256

    1a8fc50d24bc7f0f5b7e206119d4985bc2d142a1d35c7936cc350d730c971816

  • SHA512

    f707612ff2353cfc9006234df20d1f05e985fbdc69e8d0723757652ab762da7c2a5599f5af146c72876252af54fe09bb275afc54e3b5ca52ca5feaf68faa3067

  • SSDEEP

    3072:BJplVcWRZmUhZTVzU61uSGNgRfVyxMnV84FF80:vpbck3yquSGNusMnPX

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1a8fc50d24bc7f0f5b7e206119d4985bc2d142a1d35c7936cc350d730c971816N.exe

    • Size

      120KB

    • MD5

      ad3bb5b5eb9532a608162e96f0747400

    • SHA1

      3188eb793636086063f5f4ed7ef95470165ed304

    • SHA256

      1a8fc50d24bc7f0f5b7e206119d4985bc2d142a1d35c7936cc350d730c971816

    • SHA512

      f707612ff2353cfc9006234df20d1f05e985fbdc69e8d0723757652ab762da7c2a5599f5af146c72876252af54fe09bb275afc54e3b5ca52ca5feaf68faa3067

    • SSDEEP

      3072:BJplVcWRZmUhZTVzU61uSGNgRfVyxMnV84FF80:vpbck3yquSGNusMnPX

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks