General

  • Target

    fa98207102930df6d4f6eb9598cf1c8528ad8623e01e43767fa26ce3070e4d86N.exe

  • Size

    120KB

  • Sample

    241216-s4smtstqax

  • MD5

    30a2019884656acab2844b40ace20a00

  • SHA1

    d961f9a7ae685bbcef04a85d28ca0c9fc44c8e04

  • SHA256

    fa98207102930df6d4f6eb9598cf1c8528ad8623e01e43767fa26ce3070e4d86

  • SHA512

    0a087d0609c2277b22d2e4ae92174edf7f6292ae554e024aeff910184c6a541900fb7663d46fefcecb6d589c3a371f4a512353c2e1c412efb83579d5526ffb9e

  • SSDEEP

    3072:eqXEauoHYor0Non86nmAeLS8qe6orY/e4:xrYorHOmVe4

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      fa98207102930df6d4f6eb9598cf1c8528ad8623e01e43767fa26ce3070e4d86N.exe

    • Size

      120KB

    • MD5

      30a2019884656acab2844b40ace20a00

    • SHA1

      d961f9a7ae685bbcef04a85d28ca0c9fc44c8e04

    • SHA256

      fa98207102930df6d4f6eb9598cf1c8528ad8623e01e43767fa26ce3070e4d86

    • SHA512

      0a087d0609c2277b22d2e4ae92174edf7f6292ae554e024aeff910184c6a541900fb7663d46fefcecb6d589c3a371f4a512353c2e1c412efb83579d5526ffb9e

    • SSDEEP

      3072:eqXEauoHYor0Non86nmAeLS8qe6orY/e4:xrYorHOmVe4

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks