General

  • Target

    ebe2efd80ec047878518885b82893deca09e9983f82ea8c1ba1f51d433943641N.exe

  • Size

    120KB

  • Sample

    241216-t8m4kswmem

  • MD5

    3f85010be6e2b0fecb67205610e4f4f0

  • SHA1

    9a523e95f8098103a3c56a73e442bee7aed3e425

  • SHA256

    ebe2efd80ec047878518885b82893deca09e9983f82ea8c1ba1f51d433943641

  • SHA512

    f7d739dab5080f49967315c9a617c665daaaa1cdf6886b862d2af6511146d37829983a8a1153d22ebf021f7a435e2a92483831005edc0d42d9580e84fd44ddcf

  • SSDEEP

    3072:FGQ26AheqEtB/BO+GNShz7k4U5JV5fYCDqkJIJt:FdAoqQBBO+a8z9cX5fYXkGJt

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ebe2efd80ec047878518885b82893deca09e9983f82ea8c1ba1f51d433943641N.exe

    • Size

      120KB

    • MD5

      3f85010be6e2b0fecb67205610e4f4f0

    • SHA1

      9a523e95f8098103a3c56a73e442bee7aed3e425

    • SHA256

      ebe2efd80ec047878518885b82893deca09e9983f82ea8c1ba1f51d433943641

    • SHA512

      f7d739dab5080f49967315c9a617c665daaaa1cdf6886b862d2af6511146d37829983a8a1153d22ebf021f7a435e2a92483831005edc0d42d9580e84fd44ddcf

    • SSDEEP

      3072:FGQ26AheqEtB/BO+GNShz7k4U5JV5fYCDqkJIJt:FdAoqQBBO+a8z9cX5fYXkGJt

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks