General

  • Target

    d6d844e9d462747c5515efc512d29238c48193a7f8d516a6fc6edfd6ad0c4383N.exe

  • Size

    120KB

  • Sample

    241216-ws9czsxjg1

  • MD5

    196e9a5ca852a99ab6e1dae972bdd640

  • SHA1

    02d67a5e4f5104e8323e19825d9f83970e788ec4

  • SHA256

    d6d844e9d462747c5515efc512d29238c48193a7f8d516a6fc6edfd6ad0c4383

  • SHA512

    2c9bbd2328ef5f2db1fec88c5b51d21464b631555dd1311418a04effda884e610447f22afd4a99fc2b993615a132e973df4d83b48c40152025a1fcf44090b42c

  • SSDEEP

    1536:yr4CQ/8CWyoU8KR2Z2GqxPCjXl1M93JYbUMVIPJDHyynNk1PhIRGKI4/v:yr3E8dy1FtPCI3GbUMVIRyGNQGRo4

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d6d844e9d462747c5515efc512d29238c48193a7f8d516a6fc6edfd6ad0c4383N.exe

    • Size

      120KB

    • MD5

      196e9a5ca852a99ab6e1dae972bdd640

    • SHA1

      02d67a5e4f5104e8323e19825d9f83970e788ec4

    • SHA256

      d6d844e9d462747c5515efc512d29238c48193a7f8d516a6fc6edfd6ad0c4383

    • SHA512

      2c9bbd2328ef5f2db1fec88c5b51d21464b631555dd1311418a04effda884e610447f22afd4a99fc2b993615a132e973df4d83b48c40152025a1fcf44090b42c

    • SSDEEP

      1536:yr4CQ/8CWyoU8KR2Z2GqxPCjXl1M93JYbUMVIPJDHyynNk1PhIRGKI4/v:yr3E8dy1FtPCI3GbUMVIRyGNQGRo4

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks