General

  • Target

    f947b52d7d7a00d3d1bc1505624040378376a82018daeccfb8c7e7170386467aN.exe

  • Size

    97KB

  • Sample

    241220-dpeebsxpby

  • MD5

    de47064a338a796089e9b97ba859a8f0

  • SHA1

    426410fa67f641e56f097c8fa06ab5a161e396a4

  • SHA256

    f947b52d7d7a00d3d1bc1505624040378376a82018daeccfb8c7e7170386467a

  • SHA512

    a14638657a96e25f268d979892b35ed27192b3558ef8a3051ba0ea0387fc3590ac67aa2b9211d2fe31bb1a351eeac7ea48423beb2b01d9094e902e98bd406832

  • SSDEEP

    3072:wDOA6HQxuSUsJt8cN24qcKwVFNKlGHvuh:w6HOV8mqc7vw6v

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      f947b52d7d7a00d3d1bc1505624040378376a82018daeccfb8c7e7170386467aN.exe

    • Size

      97KB

    • MD5

      de47064a338a796089e9b97ba859a8f0

    • SHA1

      426410fa67f641e56f097c8fa06ab5a161e396a4

    • SHA256

      f947b52d7d7a00d3d1bc1505624040378376a82018daeccfb8c7e7170386467a

    • SHA512

      a14638657a96e25f268d979892b35ed27192b3558ef8a3051ba0ea0387fc3590ac67aa2b9211d2fe31bb1a351eeac7ea48423beb2b01d9094e902e98bd406832

    • SSDEEP

      3072:wDOA6HQxuSUsJt8cN24qcKwVFNKlGHvuh:w6HOV8mqc7vw6v

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks