General

  • Target

    d5869b4d3673a9550f51878d579686054470c9b798352b57ef7c1205a696c9dfN.exe

  • Size

    120KB

  • Sample

    241217-qgr2nsznas

  • MD5

    ab139edb1ac4d30807c2c1aa7ebd3600

  • SHA1

    7ebbc11af25f01455f6233d4b132c0d9110aa0c1

  • SHA256

    d5869b4d3673a9550f51878d579686054470c9b798352b57ef7c1205a696c9df

  • SHA512

    b8dd8cdb0a363e20e6383d0bbca1e002fec53ea8be1e21b8a1382214b285926a2222d9a1c9c5f700e1e88de269e632b96ae900874bdc4581e7799c8c9ab25cbe

  • SSDEEP

    3072:soBFxb8t20SSVt0y5EkMuKYKz0xDjWpe:NFxbM15X7KYKzaDjWpe

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d5869b4d3673a9550f51878d579686054470c9b798352b57ef7c1205a696c9dfN.exe

    • Size

      120KB

    • MD5

      ab139edb1ac4d30807c2c1aa7ebd3600

    • SHA1

      7ebbc11af25f01455f6233d4b132c0d9110aa0c1

    • SHA256

      d5869b4d3673a9550f51878d579686054470c9b798352b57ef7c1205a696c9df

    • SHA512

      b8dd8cdb0a363e20e6383d0bbca1e002fec53ea8be1e21b8a1382214b285926a2222d9a1c9c5f700e1e88de269e632b96ae900874bdc4581e7799c8c9ab25cbe

    • SSDEEP

      3072:soBFxb8t20SSVt0y5EkMuKYKz0xDjWpe:NFxbM15X7KYKzaDjWpe

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks