General

  • Target

    08397413e81976768c03b63210ca8bf324715bb20ad821d04afdfc50c3adeb3d.exe

  • Size

    120KB

  • Sample

    241217-apr4msvkdv

  • MD5

    d317053302c55622f1ae96a872e69873

  • SHA1

    f56a76cd3054619050f02edb95a02d7f7d3dbe9c

  • SHA256

    08397413e81976768c03b63210ca8bf324715bb20ad821d04afdfc50c3adeb3d

  • SHA512

    7b1700e4010090758e85c4733dcc4c0f30299df33c9914d15b95fc0e36bbfc9317edfeba481bf344de799936b583cde3073c9609a3284d8f86e64a9930948e23

  • SSDEEP

    1536:Wx3JhohEf7DPl8wPrlKif5+4ZCB5KPJnMWQ6tNqgdzWRp1MkZjpqeE1fJYMw:Q5ZfPPl8MZKCZCyPJn1XfgpVWg

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      08397413e81976768c03b63210ca8bf324715bb20ad821d04afdfc50c3adeb3d.exe

    • Size

      120KB

    • MD5

      d317053302c55622f1ae96a872e69873

    • SHA1

      f56a76cd3054619050f02edb95a02d7f7d3dbe9c

    • SHA256

      08397413e81976768c03b63210ca8bf324715bb20ad821d04afdfc50c3adeb3d

    • SHA512

      7b1700e4010090758e85c4733dcc4c0f30299df33c9914d15b95fc0e36bbfc9317edfeba481bf344de799936b583cde3073c9609a3284d8f86e64a9930948e23

    • SSDEEP

      1536:Wx3JhohEf7DPl8wPrlKif5+4ZCB5KPJnMWQ6tNqgdzWRp1MkZjpqeE1fJYMw:Q5ZfPPl8MZKCZCyPJn1XfgpVWg

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks