General

  • Target

    2f191924afb7e42636d772193b2430075077f450cf132e2ddff2ca7cefad71db.exe

  • Size

    120KB

  • Sample

    241217-abml1avnam

  • MD5

    233e6aa6e62674b8ad543709e34d4f97

  • SHA1

    257a429ed54fb39eed3ff27419b0c386072e06eb

  • SHA256

    2f191924afb7e42636d772193b2430075077f450cf132e2ddff2ca7cefad71db

  • SHA512

    1328d01f8ea1a9414a2fce2d79a3564caf405464a2b6732706e4245bf94f414073be31d006874108ae469a6c2d30cfbea50b9a640afac7975fc05bb688cf66fe

  • SSDEEP

    1536:6NOBmW/5lqc6pyH6DghV9CYCAViO9d+ImHEg6AcQw1G5L62nPdoJU/24JjrI:rLhlqcGpMqdAV7+ImHp6lh1Q68yJ1

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2f191924afb7e42636d772193b2430075077f450cf132e2ddff2ca7cefad71db.exe

    • Size

      120KB

    • MD5

      233e6aa6e62674b8ad543709e34d4f97

    • SHA1

      257a429ed54fb39eed3ff27419b0c386072e06eb

    • SHA256

      2f191924afb7e42636d772193b2430075077f450cf132e2ddff2ca7cefad71db

    • SHA512

      1328d01f8ea1a9414a2fce2d79a3564caf405464a2b6732706e4245bf94f414073be31d006874108ae469a6c2d30cfbea50b9a640afac7975fc05bb688cf66fe

    • SSDEEP

      1536:6NOBmW/5lqc6pyH6DghV9CYCAViO9d+ImHEg6AcQw1G5L62nPdoJU/24JjrI:rLhlqcGpMqdAV7+ImHp6lh1Q68yJ1

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks