General

  • Target

    e4aeb46a782a7a90f0b5566fdba9347ece3889352b2cbdec7dda566a51ac8912N.exe

  • Size

    120KB

  • Sample

    241217-j9y75avnb1

  • MD5

    e3789691563a728e72817554015ae440

  • SHA1

    c83352573feddfccb4be34dcc40e278b57ea8313

  • SHA256

    e4aeb46a782a7a90f0b5566fdba9347ece3889352b2cbdec7dda566a51ac8912

  • SHA512

    e1a7f62cf9a463590d8629e04e5cdf89127073654382680343fb46df0745f6da93b8acbebd3cee74e8ecb428b66e755ea2e264e1b2aa05afedc3347ab51ea78f

  • SSDEEP

    1536:pSH2SZIMP+TxasIAmynN05Q72tI08kdlZQLpoC/YJqvufo7SmqdtOHpFom6iu69U:pGYvxPIWnN0MYj1QuGSq22/qDOHgm6i

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e4aeb46a782a7a90f0b5566fdba9347ece3889352b2cbdec7dda566a51ac8912N.exe

    • Size

      120KB

    • MD5

      e3789691563a728e72817554015ae440

    • SHA1

      c83352573feddfccb4be34dcc40e278b57ea8313

    • SHA256

      e4aeb46a782a7a90f0b5566fdba9347ece3889352b2cbdec7dda566a51ac8912

    • SHA512

      e1a7f62cf9a463590d8629e04e5cdf89127073654382680343fb46df0745f6da93b8acbebd3cee74e8ecb428b66e755ea2e264e1b2aa05afedc3347ab51ea78f

    • SSDEEP

      1536:pSH2SZIMP+TxasIAmynN05Q72tI08kdlZQLpoC/YJqvufo7SmqdtOHpFom6iu69U:pGYvxPIWnN0MYj1QuGSq22/qDOHgm6i

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks