General

  • Target

    66bf5decf8189095ead02dda0d2fbf7d6af0973eef1ffe19533ab38c3fd7b062.exe

  • Size

    120KB

  • Sample

    241217-j5yqssvmez

  • MD5

    cca2e89127b69f63cadf73e76bc2fedb

  • SHA1

    c9083603791557d664a9562da6c7c682bfef087f

  • SHA256

    66bf5decf8189095ead02dda0d2fbf7d6af0973eef1ffe19533ab38c3fd7b062

  • SHA512

    62d8682fe7942cd91840d77afc946baa3e9b81709be4e633b7df0a7223a5f2c1bb27ac800be3123ef064d1eacd1e9251f278eec753a14eb30be6d9d61d359e88

  • SSDEEP

    1536:4RbFheFGVax37zNxA9Eobg04n/bQ6PS/ZVY/o7S5PEGIx5DKf2hCHLSG3D7Ydxb9:4ReUV2PATubQbY/5cJTDR3FXCtJy

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      66bf5decf8189095ead02dda0d2fbf7d6af0973eef1ffe19533ab38c3fd7b062.exe

    • Size

      120KB

    • MD5

      cca2e89127b69f63cadf73e76bc2fedb

    • SHA1

      c9083603791557d664a9562da6c7c682bfef087f

    • SHA256

      66bf5decf8189095ead02dda0d2fbf7d6af0973eef1ffe19533ab38c3fd7b062

    • SHA512

      62d8682fe7942cd91840d77afc946baa3e9b81709be4e633b7df0a7223a5f2c1bb27ac800be3123ef064d1eacd1e9251f278eec753a14eb30be6d9d61d359e88

    • SSDEEP

      1536:4RbFheFGVax37zNxA9Eobg04n/bQ6PS/ZVY/o7S5PEGIx5DKf2hCHLSG3D7Ydxb9:4ReUV2PATubQbY/5cJTDR3FXCtJy

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks