General

  • Target

    5f572d5f408506ac0b2fda354f2efbfcfc3bfb1e5c4e857466659901aa764562N.exe

  • Size

    65KB

  • Sample

    241220-fzmjsszrh1

  • MD5

    9a3e01fbacfbbaea668cf935b3aa7460

  • SHA1

    4486fc115bb480db40219910dfb44e8f0c1f145b

  • SHA256

    5f572d5f408506ac0b2fda354f2efbfcfc3bfb1e5c4e857466659901aa764562

  • SHA512

    36d696dabbe7c584e75aee0c35f702022cc6f1977ed2320caa53426ada84134fb9cad01c0b9b32d3ca098e6b68dc4076eb9b3f311e91130b9ccd97e067bce433

  • SSDEEP

    1536:C/p6q00F7nNYwqkSZ6Tpt6AUBHqDDp8vuPP3xMtW:C/p6q00Btbv6JpRG3x6W

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      5f572d5f408506ac0b2fda354f2efbfcfc3bfb1e5c4e857466659901aa764562N.exe

    • Size

      65KB

    • MD5

      9a3e01fbacfbbaea668cf935b3aa7460

    • SHA1

      4486fc115bb480db40219910dfb44e8f0c1f145b

    • SHA256

      5f572d5f408506ac0b2fda354f2efbfcfc3bfb1e5c4e857466659901aa764562

    • SHA512

      36d696dabbe7c584e75aee0c35f702022cc6f1977ed2320caa53426ada84134fb9cad01c0b9b32d3ca098e6b68dc4076eb9b3f311e91130b9ccd97e067bce433

    • SSDEEP

      1536:C/p6q00F7nNYwqkSZ6Tpt6AUBHqDDp8vuPP3xMtW:C/p6q00Btbv6JpRG3x6W

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks