General

  • Target

    417c39965e1c88b328adc9b4f55f7c2521265bf74b24d9bf969d4e1eae3fee35.exe

  • Size

    3.2MB

  • Sample

    241221-19r79asjck

  • MD5

    c1e2b57a52208f379825486418c4a68f

  • SHA1

    753b0ae92ff79bdc7250782b1d11ba8c830da8c7

  • SHA256

    417c39965e1c88b328adc9b4f55f7c2521265bf74b24d9bf969d4e1eae3fee35

  • SHA512

    bd7f45b6a9e10f14d78a7ab387cfa03e82f53acb9792ecf325a28447d3c7ab8ccb03fd8cb600e53c882882714a0288ff14b17315453561b4d7d0b0a08657f0fd

  • SSDEEP

    98304:ou3lbTbhBxCLS0Kx/XRCsFlPsKh9ApbeicTkxchy6pA32b7SuzWf:V3BxBxCLS3xZCsFyBzxcE6pAGbu

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      417c39965e1c88b328adc9b4f55f7c2521265bf74b24d9bf969d4e1eae3fee35.exe

    • Size

      3.2MB

    • MD5

      c1e2b57a52208f379825486418c4a68f

    • SHA1

      753b0ae92ff79bdc7250782b1d11ba8c830da8c7

    • SHA256

      417c39965e1c88b328adc9b4f55f7c2521265bf74b24d9bf969d4e1eae3fee35

    • SHA512

      bd7f45b6a9e10f14d78a7ab387cfa03e82f53acb9792ecf325a28447d3c7ab8ccb03fd8cb600e53c882882714a0288ff14b17315453561b4d7d0b0a08657f0fd

    • SSDEEP

      98304:ou3lbTbhBxCLS0Kx/XRCsFlPsKh9ApbeicTkxchy6pA32b7SuzWf:V3BxBxCLS3xZCsFyBzxcE6pAGbu

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks