General

  • Target

    38adb659ed0b4c02064b5ff30ec86bcb9c9a5d740e2d09975d8c5f76940dc2dcN.exe

  • Size

    120KB

  • Sample

    241217-mxb4lsxmfw

  • MD5

    247a213bb70e6693ac6b6e52dc075130

  • SHA1

    aba47aa134d27023032440f977cafcc32b7130ff

  • SHA256

    38adb659ed0b4c02064b5ff30ec86bcb9c9a5d740e2d09975d8c5f76940dc2dc

  • SHA512

    1aa40d982a3762c9a926cccd771a82a8447c69ce171a66b68ddc67e2f83f90c7e775ace480afa7bf91cd2b235535c526102720ecf1e549ad216837404952b1c1

  • SSDEEP

    1536:l/P52nsL5HSF1J5IzhUKlCIMABg5pEeawdUKaQfCDzrPde3V9ehz8RtENWtbA:lp2sL52KlmABW9VUKanDPPk3V9GIbt0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      38adb659ed0b4c02064b5ff30ec86bcb9c9a5d740e2d09975d8c5f76940dc2dcN.exe

    • Size

      120KB

    • MD5

      247a213bb70e6693ac6b6e52dc075130

    • SHA1

      aba47aa134d27023032440f977cafcc32b7130ff

    • SHA256

      38adb659ed0b4c02064b5ff30ec86bcb9c9a5d740e2d09975d8c5f76940dc2dc

    • SHA512

      1aa40d982a3762c9a926cccd771a82a8447c69ce171a66b68ddc67e2f83f90c7e775ace480afa7bf91cd2b235535c526102720ecf1e549ad216837404952b1c1

    • SSDEEP

      1536:l/P52nsL5HSF1J5IzhUKlCIMABg5pEeawdUKaQfCDzrPde3V9ehz8RtENWtbA:lp2sL52KlmABW9VUKanDPPk3V9GIbt0

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks