General

  • Target

    e98c4b558cb8ba13d205e75f1536448f6f8e2084c41fed17c46e7a89534b8b42.exe

  • Size

    1.8MB

  • Sample

    241217-hd31rstqbp

  • MD5

    591e9d013cda19046f07b1fbc888dd6a

  • SHA1

    c60e3f3e98fc588dfc724215e12617e62f7364fb

  • SHA256

    e98c4b558cb8ba13d205e75f1536448f6f8e2084c41fed17c46e7a89534b8b42

  • SHA512

    537773f933c7fa9346fa4d4465a6bd251c5ec7d7e45a259b493353ba0eccd4557d816f7e81f8bc5149b04caaa9b42b17e76eb30f27c544b5b631f5cac6753544

  • SSDEEP

    49152:sffZMOlq1y3vPhIkNqNoNI/y21vtJndjh7CdxE26:IZTwxd/FtJdjh7Az6

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      e98c4b558cb8ba13d205e75f1536448f6f8e2084c41fed17c46e7a89534b8b42.exe

    • Size

      1.8MB

    • MD5

      591e9d013cda19046f07b1fbc888dd6a

    • SHA1

      c60e3f3e98fc588dfc724215e12617e62f7364fb

    • SHA256

      e98c4b558cb8ba13d205e75f1536448f6f8e2084c41fed17c46e7a89534b8b42

    • SHA512

      537773f933c7fa9346fa4d4465a6bd251c5ec7d7e45a259b493353ba0eccd4557d816f7e81f8bc5149b04caaa9b42b17e76eb30f27c544b5b631f5cac6753544

    • SSDEEP

      49152:sffZMOlq1y3vPhIkNqNoNI/y21vtJndjh7CdxE26:IZTwxd/FtJdjh7Az6

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks