General

  • Target

    f664df47079623380310519c8eecc5a78477d1247fbe54514ef0f2b2847955dbN.exe

  • Size

    65KB

  • Sample

    241220-he8yeasrgq

  • MD5

    5025dc2f769f6d5acec94cd018becbe0

  • SHA1

    a0481a2b32bb13a762eb2858ca98809e1703d3c5

  • SHA256

    f664df47079623380310519c8eecc5a78477d1247fbe54514ef0f2b2847955db

  • SHA512

    8dabf5907742d200c4cd0ba6f0eb3afb7669148c2502e30c680e7d3edb8be3c7bb490fffdfd202e32507fdeedf3643570fc00564aeb94cd2fef611399ac9015f

  • SSDEEP

    1536:49rZW0W4a6gLOfzuw9LKf+W75Eurm/Gut8/NGT1mnYX6KO3F:0Wn4OLM9Kf+I5ju8GjTO3F

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      f664df47079623380310519c8eecc5a78477d1247fbe54514ef0f2b2847955dbN.exe

    • Size

      65KB

    • MD5

      5025dc2f769f6d5acec94cd018becbe0

    • SHA1

      a0481a2b32bb13a762eb2858ca98809e1703d3c5

    • SHA256

      f664df47079623380310519c8eecc5a78477d1247fbe54514ef0f2b2847955db

    • SHA512

      8dabf5907742d200c4cd0ba6f0eb3afb7669148c2502e30c680e7d3edb8be3c7bb490fffdfd202e32507fdeedf3643570fc00564aeb94cd2fef611399ac9015f

    • SSDEEP

      1536:49rZW0W4a6gLOfzuw9LKf+W75Eurm/Gut8/NGT1mnYX6KO3F:0Wn4OLM9Kf+I5ju8GjTO3F

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks