General

  • Target

    67eae302e821325d2131c583e550c9e5c35778549ae768c4945c32e21548c941N.exe

  • Size

    120KB

  • Sample

    241216-rsnztssndt

  • MD5

    86c2f1b4ef931ebc16c4ac16a70ea430

  • SHA1

    5b95062bf6d2028807a5075d7db179e78ae152f4

  • SHA256

    67eae302e821325d2131c583e550c9e5c35778549ae768c4945c32e21548c941

  • SHA512

    b4cd2a7a14b683ec6ae153c74cbc02756c2287e6f2e76b491264749a032e8a80c37e1fea86b3a9d34f936211f22a7813d6e7e6a0ed363726725a93c3d6fb63ff

  • SSDEEP

    1536:5QLuZwVEnKBgSx3W8CqXGvpWSMH/p149lyUBpg5+k5bq89c0yHc53r92w9yyfaa:SLQqEKHHCNWx/TQEPkk5bVbyHcvvB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      67eae302e821325d2131c583e550c9e5c35778549ae768c4945c32e21548c941N.exe

    • Size

      120KB

    • MD5

      86c2f1b4ef931ebc16c4ac16a70ea430

    • SHA1

      5b95062bf6d2028807a5075d7db179e78ae152f4

    • SHA256

      67eae302e821325d2131c583e550c9e5c35778549ae768c4945c32e21548c941

    • SHA512

      b4cd2a7a14b683ec6ae153c74cbc02756c2287e6f2e76b491264749a032e8a80c37e1fea86b3a9d34f936211f22a7813d6e7e6a0ed363726725a93c3d6fb63ff

    • SSDEEP

      1536:5QLuZwVEnKBgSx3W8CqXGvpWSMH/p149lyUBpg5+k5bq89c0yHc53r92w9yyfaa:SLQqEKHHCNWx/TQEPkk5bVbyHcvvB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks