General

  • Target

    633e801dfa663b1f6ca1377e874e9e7aa14271c70aa28d0e528d53e8e968b243.exe

  • Size

    120KB

  • Sample

    241217-g9j24atpel

  • MD5

    9f42f9b80d5b45a755c4afceecad2d7b

  • SHA1

    10bc3bb7e44f0353f6da5c5e82e463d305ef8c64

  • SHA256

    633e801dfa663b1f6ca1377e874e9e7aa14271c70aa28d0e528d53e8e968b243

  • SHA512

    921508e0a31d8f79701795e54992286100dbbff6f67e5f9e6cb8b4f1209ca9795ced437f51c6987920e882c256996088cc32814545a1a7f23ddc505ce36d63d0

  • SSDEEP

    1536:uwx9OwQmXUI7vsLOrJlCmnyQ15HKKBC+n2JDjF+w4zY9fmvkpYqARKQxvWLaYcZ4:xmWXUS19VKxJZ+w4zYwvkf6xxvTYO93e

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      633e801dfa663b1f6ca1377e874e9e7aa14271c70aa28d0e528d53e8e968b243.exe

    • Size

      120KB

    • MD5

      9f42f9b80d5b45a755c4afceecad2d7b

    • SHA1

      10bc3bb7e44f0353f6da5c5e82e463d305ef8c64

    • SHA256

      633e801dfa663b1f6ca1377e874e9e7aa14271c70aa28d0e528d53e8e968b243

    • SHA512

      921508e0a31d8f79701795e54992286100dbbff6f67e5f9e6cb8b4f1209ca9795ced437f51c6987920e882c256996088cc32814545a1a7f23ddc505ce36d63d0

    • SSDEEP

      1536:uwx9OwQmXUI7vsLOrJlCmnyQ15HKKBC+n2JDjF+w4zY9fmvkpYqARKQxvWLaYcZ4:xmWXUS19VKxJZ+w4zYwvkf6xxvTYO93e

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks