General

  • Target

    fad0ec86598c59e9540491696db970b0134a54f7509181e679f37347757ab683N.exe

  • Size

    120KB

  • Sample

    241216-tf6efsvjfs

  • MD5

    7879ea90c74c61049439135607bdddf0

  • SHA1

    0904693e566d3214c70a45b687f283e54cff5faf

  • SHA256

    fad0ec86598c59e9540491696db970b0134a54f7509181e679f37347757ab683

  • SHA512

    98e2582d51df0da5e345260a487f64a941c40469d4cab8210e0d48520579027e03cc005d8a14b8c738f993cd5cc50035b12601aee5e12eee0711cc26568939e2

  • SSDEEP

    1536:cx9sbI8gPN/ON9rNZ9gQIn/NrF/uc6zFuAHK4JTFOvQQRhvIOSW0iYsaPVa1/xpS:cnssPZOz9gDn/ec+/JQvQQRViVuuMeR

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      fad0ec86598c59e9540491696db970b0134a54f7509181e679f37347757ab683N.exe

    • Size

      120KB

    • MD5

      7879ea90c74c61049439135607bdddf0

    • SHA1

      0904693e566d3214c70a45b687f283e54cff5faf

    • SHA256

      fad0ec86598c59e9540491696db970b0134a54f7509181e679f37347757ab683

    • SHA512

      98e2582d51df0da5e345260a487f64a941c40469d4cab8210e0d48520579027e03cc005d8a14b8c738f993cd5cc50035b12601aee5e12eee0711cc26568939e2

    • SSDEEP

      1536:cx9sbI8gPN/ON9rNZ9gQIn/NrF/uc6zFuAHK4JTFOvQQRhvIOSW0iYsaPVa1/xpS:cnssPZOz9gDn/ec+/JQvQQRViVuuMeR

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks