General

  • Target

    862afad43e42ff601d86fe981b8f71c1270e4d65fbba0c106f78819f27e87f17N.exe

  • Size

    120KB

  • Sample

    241222-dtd95a1qhk

  • MD5

    19b07f673f001dc0b6d393a190f0a660

  • SHA1

    6867bb029e13a2eb77df801803f28702ae39cfb1

  • SHA256

    862afad43e42ff601d86fe981b8f71c1270e4d65fbba0c106f78819f27e87f17

  • SHA512

    902206228408003235eda9dde99f4a57b85a5225248d830dfcf028ac41c69bf7069c08a173606b407e88c15658c3beb9d5beecc7dce919ab27a8bb41b4b4aff5

  • SSDEEP

    3072:6MZLCImgW99TlBMDWxmOYRJZS5TEYbVqN:1BCqmdQB3IRJqN

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      862afad43e42ff601d86fe981b8f71c1270e4d65fbba0c106f78819f27e87f17N.exe

    • Size

      120KB

    • MD5

      19b07f673f001dc0b6d393a190f0a660

    • SHA1

      6867bb029e13a2eb77df801803f28702ae39cfb1

    • SHA256

      862afad43e42ff601d86fe981b8f71c1270e4d65fbba0c106f78819f27e87f17

    • SHA512

      902206228408003235eda9dde99f4a57b85a5225248d830dfcf028ac41c69bf7069c08a173606b407e88c15658c3beb9d5beecc7dce919ab27a8bb41b4b4aff5

    • SSDEEP

      3072:6MZLCImgW99TlBMDWxmOYRJZS5TEYbVqN:1BCqmdQB3IRJqN

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks