General

  • Target

    591ca4445c728e304835dbc6b72420840856b68b3013bcd4103823897ca95ff2.exe

  • Size

    65KB

  • Sample

    241225-tnz8eaxqav

  • MD5

    e3093db0482aa616ccad0208eab36724

  • SHA1

    aa15c45d281d0c47a1e1d92746960d5859c11f76

  • SHA256

    591ca4445c728e304835dbc6b72420840856b68b3013bcd4103823897ca95ff2

  • SHA512

    d6e6efb2e7238fcef5c356dd2afb69fd483e71a6539183e80a4df1a4d87bf8fdb0a787b5eaf302e56855ff0457d08ed5f797bbf5e84a0368f6ac4c8cb14a42ae

  • SSDEEP

    1536:BU/vWl8AEr+S5OiMkukyFnJ9t8iAq0ZwwdJR:aHHBf+kuk+T+ilCZR

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      591ca4445c728e304835dbc6b72420840856b68b3013bcd4103823897ca95ff2.exe

    • Size

      65KB

    • MD5

      e3093db0482aa616ccad0208eab36724

    • SHA1

      aa15c45d281d0c47a1e1d92746960d5859c11f76

    • SHA256

      591ca4445c728e304835dbc6b72420840856b68b3013bcd4103823897ca95ff2

    • SHA512

      d6e6efb2e7238fcef5c356dd2afb69fd483e71a6539183e80a4df1a4d87bf8fdb0a787b5eaf302e56855ff0457d08ed5f797bbf5e84a0368f6ac4c8cb14a42ae

    • SSDEEP

      1536:BU/vWl8AEr+S5OiMkukyFnJ9t8iAq0ZwwdJR:aHHBf+kuk+T+ilCZR

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks