General

  • Target

    082dbf376175e714a33842341a4a63b303922d9fdeaac1008759c24397a721f6N.exe

  • Size

    120KB

  • Sample

    241217-bhyhhswqbk

  • MD5

    7138b6eb9c4f042fe1c9d71dc04a1350

  • SHA1

    4e936bf9c767f1a6bb8b0e11104a0472f7ce8997

  • SHA256

    082dbf376175e714a33842341a4a63b303922d9fdeaac1008759c24397a721f6

  • SHA512

    d5527df3322906c3d7f0bb444cb567977f9a8b83f5f6c25d5a0da036bb953c9276f834025cc742d6c946e2de527416e0d080fbc4fa41c526d79d6f7c5f41a99c

  • SSDEEP

    1536:0w/lXQuuIMscQcJkC9Q0U28N7AVNHLHwzQYA/SeItvtBbWUzLhmNb:0elXQubj09JyAVtLHwzQY+dI/xzY

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      082dbf376175e714a33842341a4a63b303922d9fdeaac1008759c24397a721f6N.exe

    • Size

      120KB

    • MD5

      7138b6eb9c4f042fe1c9d71dc04a1350

    • SHA1

      4e936bf9c767f1a6bb8b0e11104a0472f7ce8997

    • SHA256

      082dbf376175e714a33842341a4a63b303922d9fdeaac1008759c24397a721f6

    • SHA512

      d5527df3322906c3d7f0bb444cb567977f9a8b83f5f6c25d5a0da036bb953c9276f834025cc742d6c946e2de527416e0d080fbc4fa41c526d79d6f7c5f41a99c

    • SSDEEP

      1536:0w/lXQuuIMscQcJkC9Q0U28N7AVNHLHwzQYA/SeItvtBbWUzLhmNb:0elXQubj09JyAVtLHwzQY+dI/xzY

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks