General

  • Target

    677070949ac805024615191614fb426d8ce95610b028fe307b05245c221c0633N.exe

  • Size

    120KB

  • Sample

    241216-r3c1batndk

  • MD5

    4480c704a2d26c481758e8352cda4210

  • SHA1

    58aa76c4ec63ee891a231c260e3c04161a465e7b

  • SHA256

    677070949ac805024615191614fb426d8ce95610b028fe307b05245c221c0633

  • SHA512

    26328782d483ae87cedcf098c001fe593ea5994a1215a4388a4674359965e96fe276ceabfe46e34d3e5f76994bffb08c28e77cbc145477d09ed9f725ecfffb84

  • SSDEEP

    3072:YSHlBQ704onYUVeh5pmAJJTCTXzNn9wnJ13:zHlaQFqzxyzN94

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      677070949ac805024615191614fb426d8ce95610b028fe307b05245c221c0633N.exe

    • Size

      120KB

    • MD5

      4480c704a2d26c481758e8352cda4210

    • SHA1

      58aa76c4ec63ee891a231c260e3c04161a465e7b

    • SHA256

      677070949ac805024615191614fb426d8ce95610b028fe307b05245c221c0633

    • SHA512

      26328782d483ae87cedcf098c001fe593ea5994a1215a4388a4674359965e96fe276ceabfe46e34d3e5f76994bffb08c28e77cbc145477d09ed9f725ecfffb84

    • SSDEEP

      3072:YSHlBQ704onYUVeh5pmAJJTCTXzNn9wnJ13:zHlaQFqzxyzN94

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks