General

  • Target

    56b29e6cfc65618539437b9d58231d1b733362fdcb6f30e7435adc3dcdf215bdN.exe

  • Size

    1.8MB

  • Sample

    241217-a5dk7awldq

  • MD5

    fd21acd09d1d06345672d9dc7564b2d0

  • SHA1

    a3bdfa50f61c3bee187f741336e3908a609c9e00

  • SHA256

    56b29e6cfc65618539437b9d58231d1b733362fdcb6f30e7435adc3dcdf215bd

  • SHA512

    28361e8bd30e25dd50190b35b7489caeb280e39cdc18bcf447bae7002e0dc08d5a3222b18be19a9c6f335bbe8cfb41fcd08506f7883ed33f016395cfed386618

  • SSDEEP

    49152:sbTC9RxKCnFnQXBbrtgb/iQvu0UHOaYmLCm:s6zxvWbrtUTrUHO2h

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      56b29e6cfc65618539437b9d58231d1b733362fdcb6f30e7435adc3dcdf215bdN.exe

    • Size

      1.8MB

    • MD5

      fd21acd09d1d06345672d9dc7564b2d0

    • SHA1

      a3bdfa50f61c3bee187f741336e3908a609c9e00

    • SHA256

      56b29e6cfc65618539437b9d58231d1b733362fdcb6f30e7435adc3dcdf215bd

    • SHA512

      28361e8bd30e25dd50190b35b7489caeb280e39cdc18bcf447bae7002e0dc08d5a3222b18be19a9c6f335bbe8cfb41fcd08506f7883ed33f016395cfed386618

    • SSDEEP

      49152:sbTC9RxKCnFnQXBbrtgb/iQvu0UHOaYmLCm:s6zxvWbrtUTrUHO2h

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks