General

  • Target

    117f7b766e012a9c63fef11e97c4119eeacb3e36c05f6185b721ab65ab5bfa5fN.exe

  • Size

    120KB

  • Sample

    241217-ephbnazncz

  • MD5

    660f3e49c015736f102180a76d7910c0

  • SHA1

    ddc8767303674dc89f20601389d7ef5aa1a8c403

  • SHA256

    117f7b766e012a9c63fef11e97c4119eeacb3e36c05f6185b721ab65ab5bfa5f

  • SHA512

    6e21faa57cb7123537273c41f651763d4fedd7c1fa2ce646b0c2ef8aa76d1a3a7b686924cafc5caa1f415764c0818d15d8ad7d78574f29d8660ab047d2a1b702

  • SSDEEP

    3072:4rYftpkFXOh0jCJ+CioOANL96TCpjeN2O9:4r1hO0jCJbidAnIoW2

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      117f7b766e012a9c63fef11e97c4119eeacb3e36c05f6185b721ab65ab5bfa5fN.exe

    • Size

      120KB

    • MD5

      660f3e49c015736f102180a76d7910c0

    • SHA1

      ddc8767303674dc89f20601389d7ef5aa1a8c403

    • SHA256

      117f7b766e012a9c63fef11e97c4119eeacb3e36c05f6185b721ab65ab5bfa5f

    • SHA512

      6e21faa57cb7123537273c41f651763d4fedd7c1fa2ce646b0c2ef8aa76d1a3a7b686924cafc5caa1f415764c0818d15d8ad7d78574f29d8660ab047d2a1b702

    • SSDEEP

      3072:4rYftpkFXOh0jCJ+CioOANL96TCpjeN2O9:4r1hO0jCJbidAnIoW2

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks