General

  • Target

    82c5a38d68103687748ff82e35881870917da570f77912d371f62d02ede8a84cN.exe

  • Size

    65KB

  • Sample

    241220-d4r9qsynhq

  • MD5

    c1972bd5bc8c73fdbea51f0b3cb2e310

  • SHA1

    91d3d810e281fbb2c27eaf8b99ab3989ba41271c

  • SHA256

    82c5a38d68103687748ff82e35881870917da570f77912d371f62d02ede8a84c

  • SHA512

    f044f48a0c409675b427da7f4af6f14e9f0134d0aadb05b3d7c8c7aa528dfcb729b76a572ca3dd7e01666e84b07f9c2bdc05387731a111e0c94467fa33075bed

  • SSDEEP

    1536:sZ+3ZXsO0flOl1gxiC9TCbK7A7PHgC4cNhUgYR6G4wsoME:D3pr0f2181FCskB4cNh4Fs+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      82c5a38d68103687748ff82e35881870917da570f77912d371f62d02ede8a84cN.exe

    • Size

      65KB

    • MD5

      c1972bd5bc8c73fdbea51f0b3cb2e310

    • SHA1

      91d3d810e281fbb2c27eaf8b99ab3989ba41271c

    • SHA256

      82c5a38d68103687748ff82e35881870917da570f77912d371f62d02ede8a84c

    • SHA512

      f044f48a0c409675b427da7f4af6f14e9f0134d0aadb05b3d7c8c7aa528dfcb729b76a572ca3dd7e01666e84b07f9c2bdc05387731a111e0c94467fa33075bed

    • SSDEEP

      1536:sZ+3ZXsO0flOl1gxiC9TCbK7A7PHgC4cNhUgYR6G4wsoME:D3pr0f2181FCskB4cNh4Fs+

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks