General

  • Target

    9d836605507d06f93c1ed3aac15c663bd017c87aa88b4b28d6f2fa24d7f477a1N.exe

  • Size

    65KB

  • Sample

    241220-f9c34s1kgw

  • MD5

    e06c090b33a056ac8658d5b07dec0ec0

  • SHA1

    bbde8e7b168cb6ce668473d8be579b23dd629b89

  • SHA256

    9d836605507d06f93c1ed3aac15c663bd017c87aa88b4b28d6f2fa24d7f477a1

  • SHA512

    783dc5c60e50f06231ea2a8bf51d50043cfa0394862b4ad3015318f8d7a5a5697511bf784a262efb86cf4a83f90343f121b3766e11d12cb5ffc7ecda66df8f46

  • SSDEEP

    1536:g+gUTdrvRQMTYGz5lgwAMo4nMz7Q7sVNXFBVhCHiEzNXytnc6cu:vgUTswdONLIMz07sVVzVhCHBNXytH

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      9d836605507d06f93c1ed3aac15c663bd017c87aa88b4b28d6f2fa24d7f477a1N.exe

    • Size

      65KB

    • MD5

      e06c090b33a056ac8658d5b07dec0ec0

    • SHA1

      bbde8e7b168cb6ce668473d8be579b23dd629b89

    • SHA256

      9d836605507d06f93c1ed3aac15c663bd017c87aa88b4b28d6f2fa24d7f477a1

    • SHA512

      783dc5c60e50f06231ea2a8bf51d50043cfa0394862b4ad3015318f8d7a5a5697511bf784a262efb86cf4a83f90343f121b3766e11d12cb5ffc7ecda66df8f46

    • SSDEEP

      1536:g+gUTdrvRQMTYGz5lgwAMo4nMz7Q7sVNXFBVhCHiEzNXytnc6cu:vgUTswdONLIMz07sVVzVhCHBNXytH

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks