General

  • Target

    16edc2f2489c1a425e296b09bd67abed7e951c2b48a4df47c8ad9a667bce5d1bN.exe

  • Size

    120KB

  • Sample

    241217-fg5yes1mgv

  • MD5

    16420b0d96a7c28a56d9e2f5f1d7dcd0

  • SHA1

    f0b5e469e27cb77c75a2f5addaf7b8dde890ae95

  • SHA256

    16edc2f2489c1a425e296b09bd67abed7e951c2b48a4df47c8ad9a667bce5d1b

  • SHA512

    58f91a2d6717219c5de82fbec2869dfec40a35b727788c0b7dd1cf5ab64733fe6d9058a71d2a00334f69371c9e77219ba874e314617194d31c71b3f645a0a4dd

  • SSDEEP

    3072:zOzaSIrRbarug/0Jm1FvUicU7qhwFPD6AWiEMK:Sa0ugMJLib+wFPOf

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      16edc2f2489c1a425e296b09bd67abed7e951c2b48a4df47c8ad9a667bce5d1bN.exe

    • Size

      120KB

    • MD5

      16420b0d96a7c28a56d9e2f5f1d7dcd0

    • SHA1

      f0b5e469e27cb77c75a2f5addaf7b8dde890ae95

    • SHA256

      16edc2f2489c1a425e296b09bd67abed7e951c2b48a4df47c8ad9a667bce5d1b

    • SHA512

      58f91a2d6717219c5de82fbec2869dfec40a35b727788c0b7dd1cf5ab64733fe6d9058a71d2a00334f69371c9e77219ba874e314617194d31c71b3f645a0a4dd

    • SSDEEP

      3072:zOzaSIrRbarug/0Jm1FvUicU7qhwFPD6AWiEMK:Sa0ugMJLib+wFPOf

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks