General

  • Target

    ad858942ae4ddb040f083ff818898721b8a1554fe6784496805a24b8ad9e3e5eN.exe

  • Size

    120KB

  • Sample

    241225-xfztfstjaj

  • MD5

    0cb0e929f8e0bc6261012f0dfa3dab50

  • SHA1

    31fa6331cebd979e1f5ceb42792d067905f1ea03

  • SHA256

    ad858942ae4ddb040f083ff818898721b8a1554fe6784496805a24b8ad9e3e5e

  • SHA512

    a561aa145bfb76be760bdc46c0c3c6454abd701606ff672cd05fb91a8f6a04b579ad695edfe98c3587107e8fe350f306868768b0780521116382054966d02cff

  • SSDEEP

    1536:lCAjrNEEy0/c2pD0+2ZeZvuvN+nU0p0+zKsJW8bUoH0pKbq7pntbr692XSXu99:8AjrNEXQ0+SuGvcnpvlzUEYtbr692XX

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ad858942ae4ddb040f083ff818898721b8a1554fe6784496805a24b8ad9e3e5eN.exe

    • Size

      120KB

    • MD5

      0cb0e929f8e0bc6261012f0dfa3dab50

    • SHA1

      31fa6331cebd979e1f5ceb42792d067905f1ea03

    • SHA256

      ad858942ae4ddb040f083ff818898721b8a1554fe6784496805a24b8ad9e3e5e

    • SHA512

      a561aa145bfb76be760bdc46c0c3c6454abd701606ff672cd05fb91a8f6a04b579ad695edfe98c3587107e8fe350f306868768b0780521116382054966d02cff

    • SSDEEP

      1536:lCAjrNEEy0/c2pD0+2ZeZvuvN+nU0p0+zKsJW8bUoH0pKbq7pntbr692XSXu99:8AjrNEXQ0+SuGvcnpvlzUEYtbr692XX

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks