General

  • Target

    5c3d74517329d8e80188b5bdaaa27e577b83687cf5c977986ec65d631b7d153e.exe

  • Size

    65KB

  • Sample

    241217-ff9j8askhm

  • MD5

    c8132c06ace0e4795f3a24f8e685032a

  • SHA1

    1f31ed403afb66571af212430298b1c987a054ba

  • SHA256

    5c3d74517329d8e80188b5bdaaa27e577b83687cf5c977986ec65d631b7d153e

  • SHA512

    e556571b2fc6573ae8f303f481b854a406f7d676026fd5bf9ae0dd58c72d4734d5148727a9c2d46461d3d13508a31120ee523ea8823a28ac83522fd85254af8d

  • SSDEEP

    768:tHLknNPxtrxHIvBJT5xc/YlE44KqTQu9kRgI7gkg1ZZJnSCVWQWRjPCAnP+B9vVq:hLkN5JyZIkR1srnJFWQWRjPDP+BvQFKM

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      5c3d74517329d8e80188b5bdaaa27e577b83687cf5c977986ec65d631b7d153e.exe

    • Size

      65KB

    • MD5

      c8132c06ace0e4795f3a24f8e685032a

    • SHA1

      1f31ed403afb66571af212430298b1c987a054ba

    • SHA256

      5c3d74517329d8e80188b5bdaaa27e577b83687cf5c977986ec65d631b7d153e

    • SHA512

      e556571b2fc6573ae8f303f481b854a406f7d676026fd5bf9ae0dd58c72d4734d5148727a9c2d46461d3d13508a31120ee523ea8823a28ac83522fd85254af8d

    • SSDEEP

      768:tHLknNPxtrxHIvBJT5xc/YlE44KqTQu9kRgI7gkg1ZZJnSCVWQWRjPCAnP+B9vVq:hLkN5JyZIkR1srnJFWQWRjPDP+BvQFKM

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks