General

  • Target

    afffa445a29445320dd3f6595d18c146921a3822e3ca7b178d25b53928b2d183N.exe

  • Size

    732KB

  • Sample

    241222-fycm7svqdq

  • MD5

    c6fd562fcac483420c31fa63ab40bc20

  • SHA1

    d414c0dd9db074ae3fcd5587312d885d0136ab7d

  • SHA256

    afffa445a29445320dd3f6595d18c146921a3822e3ca7b178d25b53928b2d183

  • SHA512

    2700e8021272172694397246d9d7684fad39124bc36afdccac75c6360d1b9b1e6dca7f4a69d48173f899c8894f93e04f84ddc3b321a90128b6af5d0dc644a91d

  • SSDEEP

    12288:0TyjXW+48qWywrU4kGFezOAVuJ5PIxww7F5DO3HYffZXM5buoy:CIXW/8yw1ez54lIZF5SXYHZXUyl

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      afffa445a29445320dd3f6595d18c146921a3822e3ca7b178d25b53928b2d183N.exe

    • Size

      732KB

    • MD5

      c6fd562fcac483420c31fa63ab40bc20

    • SHA1

      d414c0dd9db074ae3fcd5587312d885d0136ab7d

    • SHA256

      afffa445a29445320dd3f6595d18c146921a3822e3ca7b178d25b53928b2d183

    • SHA512

      2700e8021272172694397246d9d7684fad39124bc36afdccac75c6360d1b9b1e6dca7f4a69d48173f899c8894f93e04f84ddc3b321a90128b6af5d0dc644a91d

    • SSDEEP

      12288:0TyjXW+48qWywrU4kGFezOAVuJ5PIxww7F5DO3HYffZXM5buoy:CIXW/8yw1ez54lIZF5SXYHZXUyl

    • Modifies firewall policy service

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks