General

  • Target

    ef6e9e5a5c54780ae15cb15b0afafa7b978f64ed67920d8213caa566c3eee2c2.exe

  • Size

    120KB

  • Sample

    241225-3lf67a1ndx

  • MD5

    1cc5407120a48b261315e018e42bdc52

  • SHA1

    d24875527b76048275a91da68b197a03e89f8fd7

  • SHA256

    ef6e9e5a5c54780ae15cb15b0afafa7b978f64ed67920d8213caa566c3eee2c2

  • SHA512

    eb98cb4385db4cd4225040e5ea5cc76a618d971db097739ae248f1887f85ff7e22af9dd28d313ac61ce0127190b13dcc2a6779004014cab1d95476b2564d387e

  • SSDEEP

    1536:mIWEvHB3H7Ny7hbzvB4YjMq6tuUOTYNWSKT81l6sP4jN6pG9ZlxED7:mIWsdZwhbLB1pWuUOT/hTSDuTb0D7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ef6e9e5a5c54780ae15cb15b0afafa7b978f64ed67920d8213caa566c3eee2c2.exe

    • Size

      120KB

    • MD5

      1cc5407120a48b261315e018e42bdc52

    • SHA1

      d24875527b76048275a91da68b197a03e89f8fd7

    • SHA256

      ef6e9e5a5c54780ae15cb15b0afafa7b978f64ed67920d8213caa566c3eee2c2

    • SHA512

      eb98cb4385db4cd4225040e5ea5cc76a618d971db097739ae248f1887f85ff7e22af9dd28d313ac61ce0127190b13dcc2a6779004014cab1d95476b2564d387e

    • SSDEEP

      1536:mIWEvHB3H7Ny7hbzvB4YjMq6tuUOTYNWSKT81l6sP4jN6pG9ZlxED7:mIWsdZwhbLB1pWuUOT/hTSDuTb0D7

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks