General

  • Target

    bdb523b041aa9274a415a332ac5fafab1be9b16813b00c5cf7e633b4e4b3b318N.exe

  • Size

    120KB

  • Sample

    241217-brfztswkgy

  • MD5

    77c45cc84eb6e49f138492b5a5553880

  • SHA1

    89f85c292ac68b51a62f7b704a7d731d32ec68f3

  • SHA256

    bdb523b041aa9274a415a332ac5fafab1be9b16813b00c5cf7e633b4e4b3b318

  • SHA512

    66e53e0d43a84e640b0bc6d1236bd6fdd3febe30046a1017ae12a68ff0791b64c9cfd37cb3dc7d4d672371423eb6d2c758ec866bff7176ba0f6723cb9db7b6aa

  • SSDEEP

    1536:Kb0z4LBLw+XWZV5AAsjEZDEQIJa6Q2lo9tsjofkp9VQPf+kkwc4L/iSzkZsE:Kb9w++V5+QIPQmoXtw9VWf+JqD

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      bdb523b041aa9274a415a332ac5fafab1be9b16813b00c5cf7e633b4e4b3b318N.exe

    • Size

      120KB

    • MD5

      77c45cc84eb6e49f138492b5a5553880

    • SHA1

      89f85c292ac68b51a62f7b704a7d731d32ec68f3

    • SHA256

      bdb523b041aa9274a415a332ac5fafab1be9b16813b00c5cf7e633b4e4b3b318

    • SHA512

      66e53e0d43a84e640b0bc6d1236bd6fdd3febe30046a1017ae12a68ff0791b64c9cfd37cb3dc7d4d672371423eb6d2c758ec866bff7176ba0f6723cb9db7b6aa

    • SSDEEP

      1536:Kb0z4LBLw+XWZV5AAsjEZDEQIJa6Q2lo9tsjofkp9VQPf+kkwc4L/iSzkZsE:Kb9w++V5+QIPQmoXtw9VWf+JqD

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks