General

  • Target

    eec132b75875bb6fa9c3f8d9d27eb7165f9d927be8bbb038654b78b68479adceN.exe

  • Size

    120KB

  • Sample

    241216-wdmknsxmbm

  • MD5

    5e9a40d806c27dba6088749724e1baf0

  • SHA1

    11e59a1cecbbd675a7bf2c2153ad63e9686f1059

  • SHA256

    eec132b75875bb6fa9c3f8d9d27eb7165f9d927be8bbb038654b78b68479adce

  • SHA512

    d0b8dfe8daafe2853a5dad8255eff026f380c377cddf60da9f71d5efd1099ecd4076ca7020849590ec745b70879e8c4436d1d79e5a8e5df36a7564d39866f50b

  • SSDEEP

    1536:bwF4Tnpl3i5tzFCcEqq9BkMR8KArnY4GB1WcTV+S7uYSFnMq67Zzk8nFa:cuzzyBFCbL96MR8vrnt6lRixFnhM

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      eec132b75875bb6fa9c3f8d9d27eb7165f9d927be8bbb038654b78b68479adceN.exe

    • Size

      120KB

    • MD5

      5e9a40d806c27dba6088749724e1baf0

    • SHA1

      11e59a1cecbbd675a7bf2c2153ad63e9686f1059

    • SHA256

      eec132b75875bb6fa9c3f8d9d27eb7165f9d927be8bbb038654b78b68479adce

    • SHA512

      d0b8dfe8daafe2853a5dad8255eff026f380c377cddf60da9f71d5efd1099ecd4076ca7020849590ec745b70879e8c4436d1d79e5a8e5df36a7564d39866f50b

    • SSDEEP

      1536:bwF4Tnpl3i5tzFCcEqq9BkMR8KArnY4GB1WcTV+S7uYSFnMq67Zzk8nFa:cuzzyBFCbL96MR8vrnt6lRixFnhM

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks