General

  • Target

    cbb09fb52daf31ac86fc69e3242b84ddb221d45c89524c1fca65bf4b5a451dc0N.exe

  • Size

    654KB

  • Sample

    241217-116dhs1lcj

  • MD5

    16251f7e20b5c6d2aa9db0e0fa96a2d0

  • SHA1

    4c00272ddf2e4f7f320d7cf8cf59b5dd678e9a65

  • SHA256

    cbb09fb52daf31ac86fc69e3242b84ddb221d45c89524c1fca65bf4b5a451dc0

  • SHA512

    16b77f5e4a8a4a7086a2a4a55e690ec5c14e809bc8fdec90c83afba606d931bef79f5ceef42a32044611995ad2ed01e47e8c29b191a47a1bcf62eb388d0dbe15

  • SSDEEP

    12288:BQe0gFJzVe3ohdwTIOzSW0l2zdpZSPPvdVwtS8J+cb0cBu0e7IOAZiqfyDGRYD1E:agFJzcMWuWhzdpA1Vw/b0x7IsqfyCRYE

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      cbb09fb52daf31ac86fc69e3242b84ddb221d45c89524c1fca65bf4b5a451dc0N.exe

    • Size

      654KB

    • MD5

      16251f7e20b5c6d2aa9db0e0fa96a2d0

    • SHA1

      4c00272ddf2e4f7f320d7cf8cf59b5dd678e9a65

    • SHA256

      cbb09fb52daf31ac86fc69e3242b84ddb221d45c89524c1fca65bf4b5a451dc0

    • SHA512

      16b77f5e4a8a4a7086a2a4a55e690ec5c14e809bc8fdec90c83afba606d931bef79f5ceef42a32044611995ad2ed01e47e8c29b191a47a1bcf62eb388d0dbe15

    • SSDEEP

      12288:BQe0gFJzVe3ohdwTIOzSW0l2zdpZSPPvdVwtS8J+cb0cBu0e7IOAZiqfyDGRYD1E:agFJzcMWuWhzdpA1Vw/b0x7IsqfyCRYE

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks