General

  • Target

    29d6e87abc325ad0e1594653bc143ed08edfe6e5d5e591c72386cada4cd02cb7N.exe

  • Size

    65KB

  • Sample

    241226-1wxwksslay

  • MD5

    27daf650d6a99a543d1c351f73b63f60

  • SHA1

    45e97527a4466c2d916228e99711f9984abbfca8

  • SHA256

    29d6e87abc325ad0e1594653bc143ed08edfe6e5d5e591c72386cada4cd02cb7

  • SHA512

    604b1d67594b2f3d83b3f17f7fa8a60804a15911d0e7a270a535408e5e3ec6d1d3aa3c3186251051a6ee09f6064fb4cca2a5c93b0b8313effa592b7cf327f3d6

  • SSDEEP

    1536:vyqxPaeNSBIuHNzNF5A9kuxhCNjM4baptJb0YbKdDcT/vw8:vyq1aG9uHdNCxgXbQtOUK6X

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      29d6e87abc325ad0e1594653bc143ed08edfe6e5d5e591c72386cada4cd02cb7N.exe

    • Size

      65KB

    • MD5

      27daf650d6a99a543d1c351f73b63f60

    • SHA1

      45e97527a4466c2d916228e99711f9984abbfca8

    • SHA256

      29d6e87abc325ad0e1594653bc143ed08edfe6e5d5e591c72386cada4cd02cb7

    • SHA512

      604b1d67594b2f3d83b3f17f7fa8a60804a15911d0e7a270a535408e5e3ec6d1d3aa3c3186251051a6ee09f6064fb4cca2a5c93b0b8313effa592b7cf327f3d6

    • SSDEEP

      1536:vyqxPaeNSBIuHNzNF5A9kuxhCNjM4baptJb0YbKdDcT/vw8:vyq1aG9uHdNCxgXbQtOUK6X

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks