General

  • Target

    910fda128bb27d348608f63cd96b41169184cc275ce457414a501954fd5fd440N.exe

  • Size

    120KB

  • Sample

    241217-dzs1gaypgv

  • MD5

    c0448f2d3b431f8ed94d1fb913c83080

  • SHA1

    79e70a54dd9c7a16537df305ecbece35675779c6

  • SHA256

    910fda128bb27d348608f63cd96b41169184cc275ce457414a501954fd5fd440

  • SHA512

    67a3ff1896d819c3dc225e360dbfe37b57adf159e0da30671c2bbe6f995fac1706105a4681476d9f3b291007ce26bd353c53a63b0bcdd39542b3de16ffb3d81d

  • SSDEEP

    3072:f3akmxxh/p2AUkIwtlmOsnrbs9pR60eOngo:fkz9hrtYbs9pSOng

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      910fda128bb27d348608f63cd96b41169184cc275ce457414a501954fd5fd440N.exe

    • Size

      120KB

    • MD5

      c0448f2d3b431f8ed94d1fb913c83080

    • SHA1

      79e70a54dd9c7a16537df305ecbece35675779c6

    • SHA256

      910fda128bb27d348608f63cd96b41169184cc275ce457414a501954fd5fd440

    • SHA512

      67a3ff1896d819c3dc225e360dbfe37b57adf159e0da30671c2bbe6f995fac1706105a4681476d9f3b291007ce26bd353c53a63b0bcdd39542b3de16ffb3d81d

    • SSDEEP

      3072:f3akmxxh/p2AUkIwtlmOsnrbs9pR60eOngo:fkz9hrtYbs9pSOng

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks