General

  • Target

    26f90c19158737254ad411e9d973c88e7861d1d26946cc2ba23c4f56216e7b87.exe

  • Size

    1.3MB

  • Sample

    241222-r7sxbssjem

  • MD5

    1f0e7d173914609e146e4ed1ce4c817b

  • SHA1

    d19bdadfc54eb0222b482457a703d27224962fe3

  • SHA256

    26f90c19158737254ad411e9d973c88e7861d1d26946cc2ba23c4f56216e7b87

  • SHA512

    4a5e7a02feecffdd1aa1e4cb63c5fa069cb21486d50b475b89a8d42a6bbeca5f80c08bf9f6ffb5e7d4c675263edae8c8a534dd4bef95fb999270d2838769844d

  • SSDEEP

    24576:aJeofAq/jp98z3kidgVs0/aMueOeOe7OxmOocRLfzyFyT96I:weofAaWk4KH/ateOeOe7OxmHcR1H

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      26f90c19158737254ad411e9d973c88e7861d1d26946cc2ba23c4f56216e7b87.exe

    • Size

      1.3MB

    • MD5

      1f0e7d173914609e146e4ed1ce4c817b

    • SHA1

      d19bdadfc54eb0222b482457a703d27224962fe3

    • SHA256

      26f90c19158737254ad411e9d973c88e7861d1d26946cc2ba23c4f56216e7b87

    • SHA512

      4a5e7a02feecffdd1aa1e4cb63c5fa069cb21486d50b475b89a8d42a6bbeca5f80c08bf9f6ffb5e7d4c675263edae8c8a534dd4bef95fb999270d2838769844d

    • SSDEEP

      24576:aJeofAq/jp98z3kidgVs0/aMueOeOe7OxmOocRLfzyFyT96I:weofAaWk4KH/ateOeOe7OxmHcR1H

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks