General

  • Target

    3d93211837be824834c409a3f7539e3d5ce22d8fb1a8179555befe2e0b6dd3baN.exe

  • Size

    120KB

  • Sample

    241216-vdhq2svrhs

  • MD5

    0c4a116fc620b012ac790d5a6e98be90

  • SHA1

    cf172028a24a62abe88a9d93acd7f46b16bd7e6d

  • SHA256

    3d93211837be824834c409a3f7539e3d5ce22d8fb1a8179555befe2e0b6dd3ba

  • SHA512

    ba341f43d573d5655eb1525dbec4a219580565165036d4b639b675fc5f76ae4c031654d30b493d2043f14bf67b6cf1c2f8eed633efdf02fe6552a87bca3aa828

  • SSDEEP

    3072:2fpCIotX4cGchu1yaUP3eBpKwggnFEOTw6WUEHl7B:2fYNB40JFApMOTw6WUEHl7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      3d93211837be824834c409a3f7539e3d5ce22d8fb1a8179555befe2e0b6dd3baN.exe

    • Size

      120KB

    • MD5

      0c4a116fc620b012ac790d5a6e98be90

    • SHA1

      cf172028a24a62abe88a9d93acd7f46b16bd7e6d

    • SHA256

      3d93211837be824834c409a3f7539e3d5ce22d8fb1a8179555befe2e0b6dd3ba

    • SHA512

      ba341f43d573d5655eb1525dbec4a219580565165036d4b639b675fc5f76ae4c031654d30b493d2043f14bf67b6cf1c2f8eed633efdf02fe6552a87bca3aa828

    • SSDEEP

      3072:2fpCIotX4cGchu1yaUP3eBpKwggnFEOTw6WUEHl7B:2fYNB40JFApMOTw6WUEHl7

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks