General

  • Target

    4d1f990c4468cdb0864ec3967a9f1f98432b35066cfbbde8514c52a3f5d63075N.exe

  • Size

    120KB

  • Sample

    241217-a2mdxswkfk

  • MD5

    8e5ec00cc5b6f32d95bc647497f90560

  • SHA1

    33db8f3a3997d4d608aaa49c95e404efb380f1f4

  • SHA256

    4d1f990c4468cdb0864ec3967a9f1f98432b35066cfbbde8514c52a3f5d63075

  • SHA512

    35dbe976475ad31aa63efadcdbeaa471f34c730b10f359dfebc57d3af43654e3a27295528b64714480b9e732bbea7ec980eacb31f608c9689caac07ddb4e2aa6

  • SSDEEP

    3072:wm2CmkmaM/dxgc7GAujHMSe/w1NdW0lG:wmAtv/doFj8

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4d1f990c4468cdb0864ec3967a9f1f98432b35066cfbbde8514c52a3f5d63075N.exe

    • Size

      120KB

    • MD5

      8e5ec00cc5b6f32d95bc647497f90560

    • SHA1

      33db8f3a3997d4d608aaa49c95e404efb380f1f4

    • SHA256

      4d1f990c4468cdb0864ec3967a9f1f98432b35066cfbbde8514c52a3f5d63075

    • SHA512

      35dbe976475ad31aa63efadcdbeaa471f34c730b10f359dfebc57d3af43654e3a27295528b64714480b9e732bbea7ec980eacb31f608c9689caac07ddb4e2aa6

    • SSDEEP

      3072:wm2CmkmaM/dxgc7GAujHMSe/w1NdW0lG:wmAtv/doFj8

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks