General

  • Target

    65f27d3e1ea89fa2bbc25a1fa4e15cce1c5bf699bd02c9a98aa57a48ce2a4789.exe

  • Size

    120KB

  • Sample

    241222-f35jsavqas

  • MD5

    0401f81b2ffb91192f7d8cfc6a576fb4

  • SHA1

    2fe0185743224bb8543ad1f10a70985706e46258

  • SHA256

    65f27d3e1ea89fa2bbc25a1fa4e15cce1c5bf699bd02c9a98aa57a48ce2a4789

  • SHA512

    92c5b2c4e9717efca7d4858f6c89c2336dfdb9cdb1b9a08b3a59b883ab81862a418bb01265c7669d1d33df6152e17a6f935611cd1161a3c96ff5acd4c30591e5

  • SSDEEP

    1536:SFnXP98ynlLUCc4iNMjwlQxTSdHrYftixOgQst79TNYCrf8MeZ4P10+f7:8qlf4WMwliTSdLYfcgzO9Jvf8ei+T

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      65f27d3e1ea89fa2bbc25a1fa4e15cce1c5bf699bd02c9a98aa57a48ce2a4789.exe

    • Size

      120KB

    • MD5

      0401f81b2ffb91192f7d8cfc6a576fb4

    • SHA1

      2fe0185743224bb8543ad1f10a70985706e46258

    • SHA256

      65f27d3e1ea89fa2bbc25a1fa4e15cce1c5bf699bd02c9a98aa57a48ce2a4789

    • SHA512

      92c5b2c4e9717efca7d4858f6c89c2336dfdb9cdb1b9a08b3a59b883ab81862a418bb01265c7669d1d33df6152e17a6f935611cd1161a3c96ff5acd4c30591e5

    • SSDEEP

      1536:SFnXP98ynlLUCc4iNMjwlQxTSdHrYftixOgQst79TNYCrf8MeZ4P10+f7:8qlf4WMwliTSdLYfcgzO9Jvf8ei+T

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks