General

  • Target

    be478076b42c08c352e2b141bb33df6ddcd56fa1d4fa137b0eec45543561569d.exe

  • Size

    120KB

  • Sample

    241222-nqv4kswpcw

  • MD5

    92d07287990f1e05899a4d6ae1be6b7e

  • SHA1

    a95a1004f6af310a393a4f8782ac1c1b54b2fe60

  • SHA256

    be478076b42c08c352e2b141bb33df6ddcd56fa1d4fa137b0eec45543561569d

  • SHA512

    4c9132650734bac604c7511520cfae4c156d2f2c953165fd460fc41ee4ffc6fc73d5dcefed07d9b02561e353f1afa6287435e0c020f8e31f17a363142f20d596

  • SSDEEP

    3072:QN+fXR9V4SMp/jI0a44Upw0K1yifBi8qfJW:Qwh9g7akA1ZJpqE

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      be478076b42c08c352e2b141bb33df6ddcd56fa1d4fa137b0eec45543561569d.exe

    • Size

      120KB

    • MD5

      92d07287990f1e05899a4d6ae1be6b7e

    • SHA1

      a95a1004f6af310a393a4f8782ac1c1b54b2fe60

    • SHA256

      be478076b42c08c352e2b141bb33df6ddcd56fa1d4fa137b0eec45543561569d

    • SHA512

      4c9132650734bac604c7511520cfae4c156d2f2c953165fd460fc41ee4ffc6fc73d5dcefed07d9b02561e353f1afa6287435e0c020f8e31f17a363142f20d596

    • SSDEEP

      3072:QN+fXR9V4SMp/jI0a44Upw0K1yifBi8qfJW:Qwh9g7akA1ZJpqE

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks