General

  • Target

    ee514de47540b32b984e5aa602e6fd5d508f8894d40c86751611db5c66e7709bN.exe

  • Size

    120KB

  • Sample

    241217-ba6h6awnaq

  • MD5

    aa861959b01075c74480b6d3e4719b40

  • SHA1

    e62fa98298e90ec62d16d2eaf310dcb07cebd98f

  • SHA256

    ee514de47540b32b984e5aa602e6fd5d508f8894d40c86751611db5c66e7709b

  • SHA512

    469e0da26bc0005c6c3bd51c10c66a5945e5ce05946185a83d6625ed82c581d9a483cbae17e37bc095ecaab9a3e2f7e41dca180cf44dbb2872aba6edbc7c7698

  • SSDEEP

    1536:dre7/EN+0bCpYB03nJzHYo6GlPAS4qUvOGgn4zUyz2obGNcfC4PqQoQP/9mBzo:drQ/EE0GBnxJoS4xjg4zUxob8cfzPYe

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ee514de47540b32b984e5aa602e6fd5d508f8894d40c86751611db5c66e7709bN.exe

    • Size

      120KB

    • MD5

      aa861959b01075c74480b6d3e4719b40

    • SHA1

      e62fa98298e90ec62d16d2eaf310dcb07cebd98f

    • SHA256

      ee514de47540b32b984e5aa602e6fd5d508f8894d40c86751611db5c66e7709b

    • SHA512

      469e0da26bc0005c6c3bd51c10c66a5945e5ce05946185a83d6625ed82c581d9a483cbae17e37bc095ecaab9a3e2f7e41dca180cf44dbb2872aba6edbc7c7698

    • SSDEEP

      1536:dre7/EN+0bCpYB03nJzHYo6GlPAS4qUvOGgn4zUyz2obGNcfC4PqQoQP/9mBzo:drQ/EE0GBnxJoS4xjg4zUxob8cfzPYe

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks