General

  • Target

    f6f39f853d3b66cf98ec3b09bc1fe279f3f2d1f6676d54ff38eef1d70299772dN.exe

  • Size

    65KB

  • Sample

    241226-1k2qds1phx

  • MD5

    3ab674d2ac3c9740facccf4c682d5a00

  • SHA1

    475afb5e3997a5600893e27896ac876a1d73b3c9

  • SHA256

    f6f39f853d3b66cf98ec3b09bc1fe279f3f2d1f6676d54ff38eef1d70299772d

  • SHA512

    5c4e82c7b5d1186738bc55fc2f7ad9f7777303b42ba48716e3156af6a035be0825c87b7dfe4f4761d995d492dcc138ce7731a8dbf89cbf20fcc3cf05a3f9251a

  • SSDEEP

    1536:glZaWkTomWaD3A5J5Eb7kDWbFlEqI8TriNDsPz:+a9Tt2J5Q7kDWb/NiNDy

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      f6f39f853d3b66cf98ec3b09bc1fe279f3f2d1f6676d54ff38eef1d70299772dN.exe

    • Size

      65KB

    • MD5

      3ab674d2ac3c9740facccf4c682d5a00

    • SHA1

      475afb5e3997a5600893e27896ac876a1d73b3c9

    • SHA256

      f6f39f853d3b66cf98ec3b09bc1fe279f3f2d1f6676d54ff38eef1d70299772d

    • SHA512

      5c4e82c7b5d1186738bc55fc2f7ad9f7777303b42ba48716e3156af6a035be0825c87b7dfe4f4761d995d492dcc138ce7731a8dbf89cbf20fcc3cf05a3f9251a

    • SSDEEP

      1536:glZaWkTomWaD3A5J5Eb7kDWbFlEqI8TriNDsPz:+a9Tt2J5Q7kDWb/NiNDy

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks