General

  • Target

    86a20a136a5400c250cd58dea10e2110da65b003ee87bc20a167a04bc6420c2fN.exe

  • Size

    120KB

  • Sample

    241222-bal5hswrhl

  • MD5

    62d5db681d09cb244ed075b7c52c9870

  • SHA1

    6ffb00c56dd02be775881a6fd52c7c85f4042e0e

  • SHA256

    86a20a136a5400c250cd58dea10e2110da65b003ee87bc20a167a04bc6420c2f

  • SHA512

    ce80cd58d02aa705e24aa8c3da155cbafa7f7330c712d4c89704cd1de42cc3842934cba93cfaf5e7719762a910d0fb79e8926d1ad793616d3f526367b8514365

  • SSDEEP

    3072:qeONJ7+0EOpva/JtKhikimqfD7N4FMjLnL5+kfa0:PObtD18gJqfD6FUL5+kfa0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      86a20a136a5400c250cd58dea10e2110da65b003ee87bc20a167a04bc6420c2fN.exe

    • Size

      120KB

    • MD5

      62d5db681d09cb244ed075b7c52c9870

    • SHA1

      6ffb00c56dd02be775881a6fd52c7c85f4042e0e

    • SHA256

      86a20a136a5400c250cd58dea10e2110da65b003ee87bc20a167a04bc6420c2f

    • SHA512

      ce80cd58d02aa705e24aa8c3da155cbafa7f7330c712d4c89704cd1de42cc3842934cba93cfaf5e7719762a910d0fb79e8926d1ad793616d3f526367b8514365

    • SSDEEP

      3072:qeONJ7+0EOpva/JtKhikimqfD7N4FMjLnL5+kfa0:PObtD18gJqfD6FUL5+kfa0

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks