General

  • Target

    a12b6edd4834221137d67aac8f208b9d30e5e36c9dc8f95f7f1561d8ffb3a28eN.exe

  • Size

    120KB

  • Sample

    241217-a5brlawldp

  • MD5

    24ee250e7450d64727446d0cc9435ab0

  • SHA1

    a4a7bc2720dfdd69a44872f42fd490c7cedcbd42

  • SHA256

    a12b6edd4834221137d67aac8f208b9d30e5e36c9dc8f95f7f1561d8ffb3a28e

  • SHA512

    d083b658e2e6e019355ae430c6f6f0d60b5e7eda0b5698497aecd7c37ea867d990dd12442a4d6320c0373a84ca85970d23c7266dc0deab02a3e94a826798ded5

  • SSDEEP

    1536:P7cgpmQC8GP1gRG924QYSPzMBLxdLgekKUB/AXSl+p2qKAtHp8iFy+eMCJBh:Jz1GGRwQYSoxdgekHKil42VANp1F0h

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a12b6edd4834221137d67aac8f208b9d30e5e36c9dc8f95f7f1561d8ffb3a28eN.exe

    • Size

      120KB

    • MD5

      24ee250e7450d64727446d0cc9435ab0

    • SHA1

      a4a7bc2720dfdd69a44872f42fd490c7cedcbd42

    • SHA256

      a12b6edd4834221137d67aac8f208b9d30e5e36c9dc8f95f7f1561d8ffb3a28e

    • SHA512

      d083b658e2e6e019355ae430c6f6f0d60b5e7eda0b5698497aecd7c37ea867d990dd12442a4d6320c0373a84ca85970d23c7266dc0deab02a3e94a826798ded5

    • SSDEEP

      1536:P7cgpmQC8GP1gRG924QYSPzMBLxdLgekKUB/AXSl+p2qKAtHp8iFy+eMCJBh:Jz1GGRwQYSoxdgekHKil42VANp1F0h

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks