General

  • Target

    ebb493b4d22258346d9c1fa6cffb580509cfe79c9b3e7a938935b64b4d0f6455N.exe

  • Size

    120KB

  • Sample

    241216-wxg5asxqal

  • MD5

    2e2cd0f76ecc931217e27fd4526f1d50

  • SHA1

    e66fa05267a769e72bc97bbe3ca96c6a7a748be8

  • SHA256

    ebb493b4d22258346d9c1fa6cffb580509cfe79c9b3e7a938935b64b4d0f6455

  • SHA512

    30833205e3c2d345722aa5d37f0433d8471cbec3c6b75177511a6952e9e911d8c5b56a070af133230db0c6ed6519095d191e98f8890f9cf21130f4b77ec8aabe

  • SSDEEP

    1536:tpQMaAyoiSc3YNMy1Un1yy+cW0T4sWkUeBS/gqWHwQXx0KURjNDShTDjSItuOfdz:tSpW41J+UT4sW4SQHdURYTiuuAd3d1

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ebb493b4d22258346d9c1fa6cffb580509cfe79c9b3e7a938935b64b4d0f6455N.exe

    • Size

      120KB

    • MD5

      2e2cd0f76ecc931217e27fd4526f1d50

    • SHA1

      e66fa05267a769e72bc97bbe3ca96c6a7a748be8

    • SHA256

      ebb493b4d22258346d9c1fa6cffb580509cfe79c9b3e7a938935b64b4d0f6455

    • SHA512

      30833205e3c2d345722aa5d37f0433d8471cbec3c6b75177511a6952e9e911d8c5b56a070af133230db0c6ed6519095d191e98f8890f9cf21130f4b77ec8aabe

    • SSDEEP

      1536:tpQMaAyoiSc3YNMy1Un1yy+cW0T4sWkUeBS/gqWHwQXx0KURjNDShTDjSItuOfdz:tSpW41J+UT4sW4SQHdURYTiuuAd3d1

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks