General

  • Target

    0540361d0dd18f167fc1eb8ae0eba8088eff04642d181c4c947e0ff3ead2c5d2N.exe

  • Size

    120KB

  • Sample

    241216-wd91zawqft

  • MD5

    4c5d70bc20dfdb2d3ddabba04583f640

  • SHA1

    708cbc05e806ad4ed1791d12a09d0d0da61e6749

  • SHA256

    0540361d0dd18f167fc1eb8ae0eba8088eff04642d181c4c947e0ff3ead2c5d2

  • SHA512

    87d3f3df80ce1c28c6af7e1a843051d7b0f0a715beac45651c1173fe2e960239e5f085ee399fec4439911533525d97e49cf0582cc76037e2562c1dd9e9d88633

  • SSDEEP

    3072:gR0wdlVz2escm9mYToPvI2aaAxxnO/Gec7qE0sj4L:gR0DB9mYTCvIVaAxxO+ecKsj0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0540361d0dd18f167fc1eb8ae0eba8088eff04642d181c4c947e0ff3ead2c5d2N.exe

    • Size

      120KB

    • MD5

      4c5d70bc20dfdb2d3ddabba04583f640

    • SHA1

      708cbc05e806ad4ed1791d12a09d0d0da61e6749

    • SHA256

      0540361d0dd18f167fc1eb8ae0eba8088eff04642d181c4c947e0ff3ead2c5d2

    • SHA512

      87d3f3df80ce1c28c6af7e1a843051d7b0f0a715beac45651c1173fe2e960239e5f085ee399fec4439911533525d97e49cf0582cc76037e2562c1dd9e9d88633

    • SSDEEP

      3072:gR0wdlVz2escm9mYToPvI2aaAxxnO/Gec7qE0sj4L:gR0DB9mYTCvIVaAxxO+ecKsj0

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks