General

  • Target

    ffd031664ae1b4be30055ecc3406782da47a17db050e35e07593b92a4d296050N.exe

  • Size

    65KB

  • Sample

    241226-1hllds1phk

  • MD5

    24227b324e74240f5eb85b6b1b10ba30

  • SHA1

    32050e00d536f05d37c87c69c7a0b091cf09d70f

  • SHA256

    ffd031664ae1b4be30055ecc3406782da47a17db050e35e07593b92a4d296050

  • SHA512

    4f5b63eb70ea7317af1824e16593382f3ac93c573dbb6fa875be063cbc51a285d1e3b3bb8e34e58e25c444efa0b8fe795aabcfb8e013f8ee5080b8fd3193ad79

  • SSDEEP

    1536:pTVevlHrIF65G9gMgN41oa8I5PQ8pnagy1pETzrzM8N7P+p/1Kquhn:xVe9HrIFgS1p8I5Y8pdcpqHHNKpNHuhn

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ffd031664ae1b4be30055ecc3406782da47a17db050e35e07593b92a4d296050N.exe

    • Size

      65KB

    • MD5

      24227b324e74240f5eb85b6b1b10ba30

    • SHA1

      32050e00d536f05d37c87c69c7a0b091cf09d70f

    • SHA256

      ffd031664ae1b4be30055ecc3406782da47a17db050e35e07593b92a4d296050

    • SHA512

      4f5b63eb70ea7317af1824e16593382f3ac93c573dbb6fa875be063cbc51a285d1e3b3bb8e34e58e25c444efa0b8fe795aabcfb8e013f8ee5080b8fd3193ad79

    • SSDEEP

      1536:pTVevlHrIF65G9gMgN41oa8I5PQ8pnagy1pETzrzM8N7P+p/1Kquhn:xVe9HrIFgS1p8I5Y8pdcpqHHNKpNHuhn

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks