General

  • Target

    0597d3ca2d4b6715d451e3f65c2485f5dbf7f645c54f66136bf75118ca0d334e.exe

  • Size

    120KB

  • Sample

    241218-h2zcgszngr

  • MD5

    b8ce68f8c77f403203d00828a0e1b3fa

  • SHA1

    1ddd2617ff4704ad6b071e691b6cbfdae1b755be

  • SHA256

    0597d3ca2d4b6715d451e3f65c2485f5dbf7f645c54f66136bf75118ca0d334e

  • SHA512

    8dc82eac46f7450b49ebc6b5e59a45662a665429d312bb742809898313aacce04b2730a03a6ca92ade87e45b55924e6ebe73ecb8c91cec0138534bd90f1a368e

  • SSDEEP

    3072:zv5nXerm4K0AdlZ9to51pCYaJXlZ5M7XGZlijkiIF:zNXWK0EhorpqhlZi7XG3ijIF

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0597d3ca2d4b6715d451e3f65c2485f5dbf7f645c54f66136bf75118ca0d334e.exe

    • Size

      120KB

    • MD5

      b8ce68f8c77f403203d00828a0e1b3fa

    • SHA1

      1ddd2617ff4704ad6b071e691b6cbfdae1b755be

    • SHA256

      0597d3ca2d4b6715d451e3f65c2485f5dbf7f645c54f66136bf75118ca0d334e

    • SHA512

      8dc82eac46f7450b49ebc6b5e59a45662a665429d312bb742809898313aacce04b2730a03a6ca92ade87e45b55924e6ebe73ecb8c91cec0138534bd90f1a368e

    • SSDEEP

      3072:zv5nXerm4K0AdlZ9to51pCYaJXlZ5M7XGZlijkiIF:zNXWK0EhorpqhlZi7XG3ijIF

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks