General

  • Target

    4b1bc6d04438074d9004e00d56af6bdd4f763ac1a0f520c3b6f4b7d1801c37acN.exe

  • Size

    120KB

  • Sample

    241222-taqf2ssnhy

  • MD5

    58ed33e7c4543063f555a94897f8f370

  • SHA1

    18a4e09496a70e0ff2ecbfe46959ebdb3f26d29c

  • SHA256

    4b1bc6d04438074d9004e00d56af6bdd4f763ac1a0f520c3b6f4b7d1801c37ac

  • SHA512

    64447b2dde69cf27059ff3c473cff0340074fc6522fc0c517912f536ef95ef8f0e36cd3f79555708298e6473fb088175aa19ed1fef3f5eeeb2b2badc2321a11d

  • SSDEEP

    3072:9Desm00b7D3uMema1OVWRyYbXuB8Is9902zN8oPbG5R:9y0avcOVW0H8DWoPbSR

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4b1bc6d04438074d9004e00d56af6bdd4f763ac1a0f520c3b6f4b7d1801c37acN.exe

    • Size

      120KB

    • MD5

      58ed33e7c4543063f555a94897f8f370

    • SHA1

      18a4e09496a70e0ff2ecbfe46959ebdb3f26d29c

    • SHA256

      4b1bc6d04438074d9004e00d56af6bdd4f763ac1a0f520c3b6f4b7d1801c37ac

    • SHA512

      64447b2dde69cf27059ff3c473cff0340074fc6522fc0c517912f536ef95ef8f0e36cd3f79555708298e6473fb088175aa19ed1fef3f5eeeb2b2badc2321a11d

    • SSDEEP

      3072:9Desm00b7D3uMema1OVWRyYbXuB8Is9902zN8oPbG5R:9y0avcOVW0H8DWoPbSR

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks