General

  • Target

    b94b9c10e823cf38e17e3c03e78c20285e7e31c851df66eb1974ab335ac64ffcN.exe

  • Size

    120KB

  • Sample

    241216-xeb11aykgl

  • MD5

    0b8f629eca974d071cfb9ffaab03db00

  • SHA1

    6ddcdfc46129b655173d6e97911aff0af19e2881

  • SHA256

    b94b9c10e823cf38e17e3c03e78c20285e7e31c851df66eb1974ab335ac64ffc

  • SHA512

    d7ed994e595d4c58aa91503052edb5769841e893a57a9378f7c25b773a56aa99138f2251ef0a53596ff1c9fa2d3f022078bc84e77f31caa2e02657075d2fba9c

  • SSDEEP

    3072:XzlXR0z1ksvwdqvHNBdNJAyed7Y8yy+uRzSEua+gwd:Dlh0zX40vTdNq5dqmqOw

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      b94b9c10e823cf38e17e3c03e78c20285e7e31c851df66eb1974ab335ac64ffcN.exe

    • Size

      120KB

    • MD5

      0b8f629eca974d071cfb9ffaab03db00

    • SHA1

      6ddcdfc46129b655173d6e97911aff0af19e2881

    • SHA256

      b94b9c10e823cf38e17e3c03e78c20285e7e31c851df66eb1974ab335ac64ffc

    • SHA512

      d7ed994e595d4c58aa91503052edb5769841e893a57a9378f7c25b773a56aa99138f2251ef0a53596ff1c9fa2d3f022078bc84e77f31caa2e02657075d2fba9c

    • SSDEEP

      3072:XzlXR0z1ksvwdqvHNBdNJAyed7Y8yy+uRzSEua+gwd:Dlh0zX40vTdNq5dqmqOw

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks