General

  • Target

    0c385a64fcbf6471dac293cc8afa65859587e2fa3786e4ee6b53494b6797c448N.exe

  • Size

    120KB

  • Sample

    241216-t1z36swlbj

  • MD5

    758b845ff6372017409a761089f88530

  • SHA1

    2d5d822373178566d6a7ceadf295bd99650af6c7

  • SHA256

    0c385a64fcbf6471dac293cc8afa65859587e2fa3786e4ee6b53494b6797c448

  • SHA512

    1146422bc531a79e1b00968067071ef1e9c23346229526a38c703b03f704ab357f6a11f7565be85927f1609e77224bc2fddb7c33a962c122437185958a9fea65

  • SSDEEP

    3072:q3KwqQJpqxKDeKHtHyC3z+7ehnS7RNXf+sSMwt:q6wL0KD7t8FHSp

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0c385a64fcbf6471dac293cc8afa65859587e2fa3786e4ee6b53494b6797c448N.exe

    • Size

      120KB

    • MD5

      758b845ff6372017409a761089f88530

    • SHA1

      2d5d822373178566d6a7ceadf295bd99650af6c7

    • SHA256

      0c385a64fcbf6471dac293cc8afa65859587e2fa3786e4ee6b53494b6797c448

    • SHA512

      1146422bc531a79e1b00968067071ef1e9c23346229526a38c703b03f704ab357f6a11f7565be85927f1609e77224bc2fddb7c33a962c122437185958a9fea65

    • SSDEEP

      3072:q3KwqQJpqxKDeKHtHyC3z+7ehnS7RNXf+sSMwt:q6wL0KD7t8FHSp

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks