General

  • Target

    29bba5df34838bc743d2009a815955f0b80f29e9732d55ea41b657eb6e804a85.exe

  • Size

    120KB

  • Sample

    241221-2hy26asjds

  • MD5

    e6b37df88512eebf1949a7ccf8ecb5ff

  • SHA1

    52ebdffa7c0e351f72649844387b7124e079e8c7

  • SHA256

    29bba5df34838bc743d2009a815955f0b80f29e9732d55ea41b657eb6e804a85

  • SHA512

    07c3d395ea7afdd1868ad069138ad3657d83ed0bd909cb59cdf264e93d443123bdb59c1946588bfe56773d6ea2a645f3d5727deaac94a113de960d12d9b10efa

  • SSDEEP

    1536:ZIdrNcPnh0c23d7KLzLuvU9nGCfcP5t7rP+LqxhEA6tddQ0aocWsDpO0wdCSG/u6:ZIxN+h0lNRvkmP7DEI8Q0JVi9zEm

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      29bba5df34838bc743d2009a815955f0b80f29e9732d55ea41b657eb6e804a85.exe

    • Size

      120KB

    • MD5

      e6b37df88512eebf1949a7ccf8ecb5ff

    • SHA1

      52ebdffa7c0e351f72649844387b7124e079e8c7

    • SHA256

      29bba5df34838bc743d2009a815955f0b80f29e9732d55ea41b657eb6e804a85

    • SHA512

      07c3d395ea7afdd1868ad069138ad3657d83ed0bd909cb59cdf264e93d443123bdb59c1946588bfe56773d6ea2a645f3d5727deaac94a113de960d12d9b10efa

    • SSDEEP

      1536:ZIdrNcPnh0c23d7KLzLuvU9nGCfcP5t7rP+LqxhEA6tddQ0aocWsDpO0wdCSG/u6:ZIxN+h0lNRvkmP7DEI8Q0JVi9zEm

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks