General

  • Target

    1dc20ea58857205c178d3d6790c4ef01e3385f8958eb439236ee2c37bd1040adN.exe

  • Size

    120KB

  • Sample

    241216-t3qyaawlem

  • MD5

    e7e632de2af8920a36f463ee28e6e500

  • SHA1

    8ce5c4919ed733fe005006b57292e56f73c468b0

  • SHA256

    1dc20ea58857205c178d3d6790c4ef01e3385f8958eb439236ee2c37bd1040ad

  • SHA512

    ea43251a2e5571b6b975cb8682143ec3151997f113bb9b92035e70ec2cbd56c9e882d4bdb4b491294908741db24a2176de72782432a12fc4e83318ce206f1b51

  • SSDEEP

    3072:BqUdMbp2YNuJeLWildq7auurobwlsaUjJvyY4Kj:UUdsp10JeLW1+troEqaUjJ6D

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1dc20ea58857205c178d3d6790c4ef01e3385f8958eb439236ee2c37bd1040adN.exe

    • Size

      120KB

    • MD5

      e7e632de2af8920a36f463ee28e6e500

    • SHA1

      8ce5c4919ed733fe005006b57292e56f73c468b0

    • SHA256

      1dc20ea58857205c178d3d6790c4ef01e3385f8958eb439236ee2c37bd1040ad

    • SHA512

      ea43251a2e5571b6b975cb8682143ec3151997f113bb9b92035e70ec2cbd56c9e882d4bdb4b491294908741db24a2176de72782432a12fc4e83318ce206f1b51

    • SSDEEP

      3072:BqUdMbp2YNuJeLWildq7auurobwlsaUjJvyY4Kj:UUdsp10JeLW1+troEqaUjJ6D

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks