General

  • Target

    21ef1f6249885a3052105ac7fe67844de730d7abc72530417ca6c337ebfa5fa9.exe

  • Size

    120KB

  • Sample

    241217-c98y1axrhz

  • MD5

    e3dc1f367b999ee1b29b5806783fe499

  • SHA1

    e888ca2d35d99d369fa5eaf0af5e596d6556faee

  • SHA256

    21ef1f6249885a3052105ac7fe67844de730d7abc72530417ca6c337ebfa5fa9

  • SHA512

    43a24f72539c3645d194b878358cbcdf7b05962588c479d8f40d1b528798b4fa610a02bc4e145e1da6a3fe5385b4565235c84a9652f19a3118760d57640e34f0

  • SSDEEP

    3072:p5o2QtOOIzax9hROM7yXMQL/nklRfznLXL2TB:p2tOO9x9qMuXlrghjQB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      21ef1f6249885a3052105ac7fe67844de730d7abc72530417ca6c337ebfa5fa9.exe

    • Size

      120KB

    • MD5

      e3dc1f367b999ee1b29b5806783fe499

    • SHA1

      e888ca2d35d99d369fa5eaf0af5e596d6556faee

    • SHA256

      21ef1f6249885a3052105ac7fe67844de730d7abc72530417ca6c337ebfa5fa9

    • SHA512

      43a24f72539c3645d194b878358cbcdf7b05962588c479d8f40d1b528798b4fa610a02bc4e145e1da6a3fe5385b4565235c84a9652f19a3118760d57640e34f0

    • SSDEEP

      3072:p5o2QtOOIzax9hROM7yXMQL/nklRfznLXL2TB:p2tOO9x9qMuXlrghjQB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks