General

  • Target

    482c40bf313a352c279a0abca3365739926d8b543d1192f96f0c920288c5f55c.exe

  • Size

    120KB

  • Sample

    241222-phw7cayjhq

  • MD5

    64e5915d7d45eeec6008ad31c7f88067

  • SHA1

    4d11b31883981b4d73b9e2140e110a67109a63ab

  • SHA256

    482c40bf313a352c279a0abca3365739926d8b543d1192f96f0c920288c5f55c

  • SHA512

    5c9deaca4dd35e742007cf96a2beda88b14f85852a5f476e39da8d11cf3a9f468e8dd10489c99dc9200a7b5d4d3bc0daee1aaa84cec9cc5d5b98a046c8c92b54

  • SSDEEP

    3072:1LDuMWpx2HF3KhamXlfZrrYqVHst4pw5BZ2mo/9g4mdq:1mzpxyaf1fxYaHst4pw5Ro/9sc

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      482c40bf313a352c279a0abca3365739926d8b543d1192f96f0c920288c5f55c.exe

    • Size

      120KB

    • MD5

      64e5915d7d45eeec6008ad31c7f88067

    • SHA1

      4d11b31883981b4d73b9e2140e110a67109a63ab

    • SHA256

      482c40bf313a352c279a0abca3365739926d8b543d1192f96f0c920288c5f55c

    • SHA512

      5c9deaca4dd35e742007cf96a2beda88b14f85852a5f476e39da8d11cf3a9f468e8dd10489c99dc9200a7b5d4d3bc0daee1aaa84cec9cc5d5b98a046c8c92b54

    • SSDEEP

      3072:1LDuMWpx2HF3KhamXlfZrrYqVHst4pw5BZ2mo/9g4mdq:1mzpxyaf1fxYaHst4pw5Ro/9sc

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks