General

  • Target

    46e2154f5415b75435cd03d1b3feaaba827e767ef6c7d9b781a5df02fe8337b9.exe

  • Size

    65KB

  • Sample

    241222-fcwtystpcv

  • MD5

    ae525a20cbec8f07a5c9d448f1f8fae0

  • SHA1

    c4ed1ce83896aa6dfa46f3dc76bc34b209749e49

  • SHA256

    46e2154f5415b75435cd03d1b3feaaba827e767ef6c7d9b781a5df02fe8337b9

  • SHA512

    fae9a5bfed4e8503db86a0f27353303986a16af6b0052bdbfa3c15bbe6e4eb44f4625821681f8988e50ee9749a974b81405e15479ec846c17f77b4b761095748

  • SSDEEP

    1536:RBG/+B4dgxIRMmpSpeN/N8yaVJx7nBPh602CR6syB7X23gb:NUCIzpS8arpZtAC3i

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      46e2154f5415b75435cd03d1b3feaaba827e767ef6c7d9b781a5df02fe8337b9.exe

    • Size

      65KB

    • MD5

      ae525a20cbec8f07a5c9d448f1f8fae0

    • SHA1

      c4ed1ce83896aa6dfa46f3dc76bc34b209749e49

    • SHA256

      46e2154f5415b75435cd03d1b3feaaba827e767ef6c7d9b781a5df02fe8337b9

    • SHA512

      fae9a5bfed4e8503db86a0f27353303986a16af6b0052bdbfa3c15bbe6e4eb44f4625821681f8988e50ee9749a974b81405e15479ec846c17f77b4b761095748

    • SSDEEP

      1536:RBG/+B4dgxIRMmpSpeN/N8yaVJx7nBPh602CR6syB7X23gb:NUCIzpS8arpZtAC3i

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks