General

  • Target

    744d4d07165ba1d404a9cfbe377b6011e6fc47241168f76dcaf3f1562b37a4d8N.exe

  • Size

    120KB

  • Sample

    241217-fpscas1pc1

  • MD5

    923c1e6fb058383219782f0a4f8b7c40

  • SHA1

    607afcf38fa4ce6da288ff6cd0a2ce45b961ca0f

  • SHA256

    744d4d07165ba1d404a9cfbe377b6011e6fc47241168f76dcaf3f1562b37a4d8

  • SHA512

    8225453996f47d1ed696a384a373eae9de1c8bc66c076a612c15d23316e76665a1419658625d9345c2109ace76ba5600c33dc4be0ae45e44e7ee267accfc9ea7

  • SSDEEP

    3072:WEG2BEWmETe8A76x77y7K89JFYQ26+tAcGn:WEnEWmE68pXyW4JFC6+bGn

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      744d4d07165ba1d404a9cfbe377b6011e6fc47241168f76dcaf3f1562b37a4d8N.exe

    • Size

      120KB

    • MD5

      923c1e6fb058383219782f0a4f8b7c40

    • SHA1

      607afcf38fa4ce6da288ff6cd0a2ce45b961ca0f

    • SHA256

      744d4d07165ba1d404a9cfbe377b6011e6fc47241168f76dcaf3f1562b37a4d8

    • SHA512

      8225453996f47d1ed696a384a373eae9de1c8bc66c076a612c15d23316e76665a1419658625d9345c2109ace76ba5600c33dc4be0ae45e44e7ee267accfc9ea7

    • SSDEEP

      3072:WEG2BEWmETe8A76x77y7K89JFYQ26+tAcGn:WEnEWmE68pXyW4JFC6+bGn

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks