General

  • Target

    3030d3dbae471dbdfee6e02fa9ec559b2e615fde156addd18ac335e5e7ada673N.exe

  • Size

    120KB

  • Sample

    241220-bss1sawmhk

  • MD5

    001eff5d1d0581c76be5521fb1403fb0

  • SHA1

    69d0dfa0be880a50463d2ad74e8cf9a899a94793

  • SHA256

    3030d3dbae471dbdfee6e02fa9ec559b2e615fde156addd18ac335e5e7ada673

  • SHA512

    29811f9c65e6721607bd7b92914f5c7241e5b63819da964ad99515ad2aea60b2b813423bdf84740d4f4defd8cf7198e8c28ee72e96cc09a94ac1e50438fbe92a

  • SSDEEP

    3072:lh6NDIOl7m2m5nD095Gq7lB2Z8FFTBHUlH:l0I6m5nDk5JhB2qbTB0R

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      3030d3dbae471dbdfee6e02fa9ec559b2e615fde156addd18ac335e5e7ada673N.exe

    • Size

      120KB

    • MD5

      001eff5d1d0581c76be5521fb1403fb0

    • SHA1

      69d0dfa0be880a50463d2ad74e8cf9a899a94793

    • SHA256

      3030d3dbae471dbdfee6e02fa9ec559b2e615fde156addd18ac335e5e7ada673

    • SHA512

      29811f9c65e6721607bd7b92914f5c7241e5b63819da964ad99515ad2aea60b2b813423bdf84740d4f4defd8cf7198e8c28ee72e96cc09a94ac1e50438fbe92a

    • SSDEEP

      3072:lh6NDIOl7m2m5nD095Gq7lB2Z8FFTBHUlH:l0I6m5nDk5JhB2qbTB0R

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks