General

  • Target

    17d7910c9536b5096c4c26430e46755929bedd8866581debac08281b5bf3cbc6N.exe

  • Size

    120KB

  • Sample

    241216-th2jaavkbt

  • MD5

    b62f4ec5a78589c8d325142b4e81c690

  • SHA1

    b631b404b98d6c78cc1a05b7ba2e219d014c2682

  • SHA256

    17d7910c9536b5096c4c26430e46755929bedd8866581debac08281b5bf3cbc6

  • SHA512

    c77a1142e727d702048cdf5eb19d10fb0cd905677dd351a0e25c27cc8833dcfcb163d6189e8c73b74dc14898911d782394cd9f9c377dd4b60d6f892dc384632e

  • SSDEEP

    1536:8WDRPN7k//Mf7V9m2ng8YBYFV916XCzPvKGm30gWoCkxDAbsv8b:8W1PNYeHnhYBOWsvKv/fjDAgU

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      17d7910c9536b5096c4c26430e46755929bedd8866581debac08281b5bf3cbc6N.exe

    • Size

      120KB

    • MD5

      b62f4ec5a78589c8d325142b4e81c690

    • SHA1

      b631b404b98d6c78cc1a05b7ba2e219d014c2682

    • SHA256

      17d7910c9536b5096c4c26430e46755929bedd8866581debac08281b5bf3cbc6

    • SHA512

      c77a1142e727d702048cdf5eb19d10fb0cd905677dd351a0e25c27cc8833dcfcb163d6189e8c73b74dc14898911d782394cd9f9c377dd4b60d6f892dc384632e

    • SSDEEP

      1536:8WDRPN7k//Mf7V9m2ng8YBYFV916XCzPvKGm30gWoCkxDAbsv8b:8W1PNYeHnhYBOWsvKv/fjDAgU

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks