General

  • Target

    36cd061070451befa70c113c53e025b57baccb5fccf37c13e636778e503252bf.exe

  • Size

    120KB

  • Sample

    241225-wctycs1mbn

  • MD5

    afcc637b8deea850f9dff9af3b792b0d

  • SHA1

    9a95e9a7eeec1bd7b54b978525ee855d29197e8f

  • SHA256

    36cd061070451befa70c113c53e025b57baccb5fccf37c13e636778e503252bf

  • SHA512

    ece2edf926430f4504519957490830702f40abcfc06523d204a0a136ab37a9171c1ff1ec3d39f3a708f14cb1170bab7e21f3dc132017f96528f4d4f90dfb59f0

  • SSDEEP

    3072:TDGP7+7YeTWfnLG+rEuwKAmudVwDDegbmD1w8V:TDGHeTwLncNdVdDO8V

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      36cd061070451befa70c113c53e025b57baccb5fccf37c13e636778e503252bf.exe

    • Size

      120KB

    • MD5

      afcc637b8deea850f9dff9af3b792b0d

    • SHA1

      9a95e9a7eeec1bd7b54b978525ee855d29197e8f

    • SHA256

      36cd061070451befa70c113c53e025b57baccb5fccf37c13e636778e503252bf

    • SHA512

      ece2edf926430f4504519957490830702f40abcfc06523d204a0a136ab37a9171c1ff1ec3d39f3a708f14cb1170bab7e21f3dc132017f96528f4d4f90dfb59f0

    • SSDEEP

      3072:TDGP7+7YeTWfnLG+rEuwKAmudVwDDegbmD1w8V:TDGHeTwLncNdVdDO8V

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks