General

  • Target

    c6e0d716210d4fba5da7d62efb0c3f583280412e73f20a03ae4397c02ab5904dN.exe

  • Size

    65KB

  • Sample

    241220-gqf64asler

  • MD5

    3898a4b4b30b05063dab268d609948f0

  • SHA1

    4b071947ce342c79a3a1b5fbc1bdde39184898d9

  • SHA256

    c6e0d716210d4fba5da7d62efb0c3f583280412e73f20a03ae4397c02ab5904d

  • SHA512

    6f23eccdc9d53d5bede4f8ae2a235175812b7114d0f3cee89e50a1e82b1cf6202f292887eb5a07559a89855f00e9564b81dfa02e8128083301997329868c76f6

  • SSDEEP

    1536:vrDA5Vc+atOi8kNt9fPkHX5/TGcsN41lvMZFM:vg5VHOfsJLxvGFM

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c6e0d716210d4fba5da7d62efb0c3f583280412e73f20a03ae4397c02ab5904dN.exe

    • Size

      65KB

    • MD5

      3898a4b4b30b05063dab268d609948f0

    • SHA1

      4b071947ce342c79a3a1b5fbc1bdde39184898d9

    • SHA256

      c6e0d716210d4fba5da7d62efb0c3f583280412e73f20a03ae4397c02ab5904d

    • SHA512

      6f23eccdc9d53d5bede4f8ae2a235175812b7114d0f3cee89e50a1e82b1cf6202f292887eb5a07559a89855f00e9564b81dfa02e8128083301997329868c76f6

    • SSDEEP

      1536:vrDA5Vc+atOi8kNt9fPkHX5/TGcsN41lvMZFM:vg5VHOfsJLxvGFM

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks