General

  • Target

    fa749dff017c79790d6204808788833562114e5ca448208477118c89282c0deaN.exe

  • Size

    120KB

  • Sample

    241216-vz7x3axjfl

  • MD5

    de800cd1cf103f69b7ffb38e55c39c40

  • SHA1

    478bc43083f8decb1f0eec82d69101a5a94ad651

  • SHA256

    fa749dff017c79790d6204808788833562114e5ca448208477118c89282c0dea

  • SHA512

    8a6eeed6d23c012cc3e55a381be1f506e11501ece039bd72821676e2dcb365620b9aceeb122c60ba4e75ea89b92b67cdd729a2a289709f3e683b9844dd2fcc3b

  • SSDEEP

    3072:g4OqyQm2W5TgGEvyZ+BQC6ajK26RDr5TRfU:mqztW5Tn4B/Glnt

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      fa749dff017c79790d6204808788833562114e5ca448208477118c89282c0deaN.exe

    • Size

      120KB

    • MD5

      de800cd1cf103f69b7ffb38e55c39c40

    • SHA1

      478bc43083f8decb1f0eec82d69101a5a94ad651

    • SHA256

      fa749dff017c79790d6204808788833562114e5ca448208477118c89282c0dea

    • SHA512

      8a6eeed6d23c012cc3e55a381be1f506e11501ece039bd72821676e2dcb365620b9aceeb122c60ba4e75ea89b92b67cdd729a2a289709f3e683b9844dd2fcc3b

    • SSDEEP

      3072:g4OqyQm2W5TgGEvyZ+BQC6ajK26RDr5TRfU:mqztW5Tn4B/Glnt

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks