General

  • Target

    f8c9eb45c8477c502330281e8c0643642d9d44b384c594f8fa686aa6ecd02689.exe

  • Size

    120KB

  • Sample

    241218-k7yz1sspfv

  • MD5

    fda11f1fda68372e0a2fec5d02793a8b

  • SHA1

    44fb5d62323a10c5fc92419501f9a3365f8fee45

  • SHA256

    f8c9eb45c8477c502330281e8c0643642d9d44b384c594f8fa686aa6ecd02689

  • SHA512

    2a07ff7e3bc73c90e3c3fb77df1480697a9219cccda5c414f66ce4c487012fc2a2861c8cce371a1e775f021f51a2773419ae4be9016d2d60cae5aabe0cf2d3b3

  • SSDEEP

    3072:uBofxvDEaFOTQ2rAvs2UuVHKWy9yRC8gKIsA8RuOW:uCJvrFKQF7r7y9ttKIsUOW

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      f8c9eb45c8477c502330281e8c0643642d9d44b384c594f8fa686aa6ecd02689.exe

    • Size

      120KB

    • MD5

      fda11f1fda68372e0a2fec5d02793a8b

    • SHA1

      44fb5d62323a10c5fc92419501f9a3365f8fee45

    • SHA256

      f8c9eb45c8477c502330281e8c0643642d9d44b384c594f8fa686aa6ecd02689

    • SHA512

      2a07ff7e3bc73c90e3c3fb77df1480697a9219cccda5c414f66ce4c487012fc2a2861c8cce371a1e775f021f51a2773419ae4be9016d2d60cae5aabe0cf2d3b3

    • SSDEEP

      3072:uBofxvDEaFOTQ2rAvs2UuVHKWy9yRC8gKIsA8RuOW:uCJvrFKQF7r7y9ttKIsUOW

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks