General

  • Target

    2c7755d11296ce7188e2a6eba5806c167f35703e163a96ce426eeedb66b7d518.exe

  • Size

    97KB

  • Sample

    241225-vh9ekazlfp

  • MD5

    89ba5914e754aa384322a497b95c23fa

  • SHA1

    aaeaf18550cbc6a198ad04839b67d016b31bc7fd

  • SHA256

    2c7755d11296ce7188e2a6eba5806c167f35703e163a96ce426eeedb66b7d518

  • SHA512

    49772c992b60d69dcc6c1e23703a56d9e2318ebcbe8779d234f090978aa5ba96df7b72b661c6506eeb613c40da10ae432fc664e03e67faca966bdc64326038a2

  • SSDEEP

    3072:eOdnFX95bFsyDyJGZgXqWIxSUQ6pthshel4F:eOxFX/yyD86WItQSnsQm

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2c7755d11296ce7188e2a6eba5806c167f35703e163a96ce426eeedb66b7d518.exe

    • Size

      97KB

    • MD5

      89ba5914e754aa384322a497b95c23fa

    • SHA1

      aaeaf18550cbc6a198ad04839b67d016b31bc7fd

    • SHA256

      2c7755d11296ce7188e2a6eba5806c167f35703e163a96ce426eeedb66b7d518

    • SHA512

      49772c992b60d69dcc6c1e23703a56d9e2318ebcbe8779d234f090978aa5ba96df7b72b661c6506eeb613c40da10ae432fc664e03e67faca966bdc64326038a2

    • SSDEEP

      3072:eOdnFX95bFsyDyJGZgXqWIxSUQ6pthshel4F:eOxFX/yyD86WItQSnsQm

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks