General

  • Target

    746c0fe86591053f1ea725fcab7565f35e68a478df0986c90348d6b3b55b378aN.exe

  • Size

    120KB

  • Sample

    241220-c1tgysxjdt

  • MD5

    e8a27bee4e760df95630308d2a2abac0

  • SHA1

    09c3a329b9ebe953204d33789e3720656685a113

  • SHA256

    746c0fe86591053f1ea725fcab7565f35e68a478df0986c90348d6b3b55b378a

  • SHA512

    2670fa60b05786c13fc65136ec5050b102d48349e10d2c1e92b005e14a6a440f1d38c28bbc9bca79548b2f4d68a9d9b27afc428aadc332c9f4e02d420971bb57

  • SSDEEP

    1536:d0XABLeJknstOt4MbTwMCpp/S6dep8CmohOP0R1hYUWU0mgy/eF0PymPXfnlP3ZM:TWMMy4YwMupK6H2W0fejmPXfnlPJM

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      746c0fe86591053f1ea725fcab7565f35e68a478df0986c90348d6b3b55b378aN.exe

    • Size

      120KB

    • MD5

      e8a27bee4e760df95630308d2a2abac0

    • SHA1

      09c3a329b9ebe953204d33789e3720656685a113

    • SHA256

      746c0fe86591053f1ea725fcab7565f35e68a478df0986c90348d6b3b55b378a

    • SHA512

      2670fa60b05786c13fc65136ec5050b102d48349e10d2c1e92b005e14a6a440f1d38c28bbc9bca79548b2f4d68a9d9b27afc428aadc332c9f4e02d420971bb57

    • SSDEEP

      1536:d0XABLeJknstOt4MbTwMCpp/S6dep8CmohOP0R1hYUWU0mgy/eF0PymPXfnlP3ZM:TWMMy4YwMupK6H2W0fejmPXfnlPJM

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks