General

  • Target

    640fed94d1633479e0edb2d50ebbbc5706a20209b3130eeb98810d009a2a76dcN.exe

  • Size

    97KB

  • Sample

    241225-ydmlsavjgs

  • MD5

    a1e6de730ba006985a5f2132245bd4d0

  • SHA1

    4646838a962b76be0198bfa97861cd478de137d7

  • SHA256

    640fed94d1633479e0edb2d50ebbbc5706a20209b3130eeb98810d009a2a76dc

  • SHA512

    039e3758e632b452f85d6f50805986e77eb824188f91ca47c8158bfa7be180e639b8f18a5ea8c40e275089d0d890995d016cad6df72fef3f2e8d476bb7afd0f1

  • SSDEEP

    1536:KUucKQn+yIVjviPU+0d/6upPpWwx5VfoRVtBE4lHIZAcskm+sh:b9+yI0U+0bpWXLtB60kBo

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      640fed94d1633479e0edb2d50ebbbc5706a20209b3130eeb98810d009a2a76dcN.exe

    • Size

      97KB

    • MD5

      a1e6de730ba006985a5f2132245bd4d0

    • SHA1

      4646838a962b76be0198bfa97861cd478de137d7

    • SHA256

      640fed94d1633479e0edb2d50ebbbc5706a20209b3130eeb98810d009a2a76dc

    • SHA512

      039e3758e632b452f85d6f50805986e77eb824188f91ca47c8158bfa7be180e639b8f18a5ea8c40e275089d0d890995d016cad6df72fef3f2e8d476bb7afd0f1

    • SSDEEP

      1536:KUucKQn+yIVjviPU+0d/6upPpWwx5VfoRVtBE4lHIZAcskm+sh:b9+yI0U+0bpWXLtB60kBo

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks