General

  • Target

    e501a7708b168c18e4effe01f9f7ed41bedbcb7f7b0bd20632daaf7e8e215c22.exe

  • Size

    654KB

  • Sample

    241218-ghgsnaxkdm

  • MD5

    926fd7ad60304c5c300af3075dd8522d

  • SHA1

    0aedfeda0a58abe4e2f52bbef05df441bd20c0dc

  • SHA256

    e501a7708b168c18e4effe01f9f7ed41bedbcb7f7b0bd20632daaf7e8e215c22

  • SHA512

    76f2b28df2d65e1eae328838e358b0bdf8b37aa23e62c63102ef48dbee2546e7bea45e356a8ffa319e9903de75a972006a1ac7df3e13fbc10220fdf024644ab5

  • SSDEEP

    12288:BQe0gFJzVe3ohdwTIOzSW0l2zdpZSPPvdVwtS8J+cb0cBu0e7IOAZiqfyDGRYD1c:agFJzcMWuWhzdpA1Vw/b0x7IsqfyCRYc

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e501a7708b168c18e4effe01f9f7ed41bedbcb7f7b0bd20632daaf7e8e215c22.exe

    • Size

      654KB

    • MD5

      926fd7ad60304c5c300af3075dd8522d

    • SHA1

      0aedfeda0a58abe4e2f52bbef05df441bd20c0dc

    • SHA256

      e501a7708b168c18e4effe01f9f7ed41bedbcb7f7b0bd20632daaf7e8e215c22

    • SHA512

      76f2b28df2d65e1eae328838e358b0bdf8b37aa23e62c63102ef48dbee2546e7bea45e356a8ffa319e9903de75a972006a1ac7df3e13fbc10220fdf024644ab5

    • SSDEEP

      12288:BQe0gFJzVe3ohdwTIOzSW0l2zdpZSPPvdVwtS8J+cb0cBu0e7IOAZiqfyDGRYD1c:agFJzcMWuWhzdpA1Vw/b0x7IsqfyCRYc

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks