General

  • Target

    3ba2241dd48993aefc6befaed4bc865dcf1241325c254bc418317c9ccca1b11fN.exe

  • Size

    120KB

  • Sample

    241217-bz42maxlbl

  • MD5

    da1fcd3798b0f3c2592d83c2bb819ff0

  • SHA1

    d5554e9f11b541c35c240630bc74be6ee49ef895

  • SHA256

    3ba2241dd48993aefc6befaed4bc865dcf1241325c254bc418317c9ccca1b11f

  • SHA512

    5bf42848f3f06375b91bac75e3743f97bebee38f632f78a5c2dcdbdd55a90a54192af9820b97cc42811567b6f9026a14ce728492d9c5f40b2663eaffd4ff998a

  • SSDEEP

    3072:kxE2oXFzDnnkFLT4Q7QRzxNEHxwvRYYGY7:rz9jkV3+zkxwpYt

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      3ba2241dd48993aefc6befaed4bc865dcf1241325c254bc418317c9ccca1b11fN.exe

    • Size

      120KB

    • MD5

      da1fcd3798b0f3c2592d83c2bb819ff0

    • SHA1

      d5554e9f11b541c35c240630bc74be6ee49ef895

    • SHA256

      3ba2241dd48993aefc6befaed4bc865dcf1241325c254bc418317c9ccca1b11f

    • SHA512

      5bf42848f3f06375b91bac75e3743f97bebee38f632f78a5c2dcdbdd55a90a54192af9820b97cc42811567b6f9026a14ce728492d9c5f40b2663eaffd4ff998a

    • SSDEEP

      3072:kxE2oXFzDnnkFLT4Q7QRzxNEHxwvRYYGY7:rz9jkV3+zkxwpYt

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks