General

  • Target

    5990cb78e84839e7a1682a30535a628dbc90affea89d740bc49a10197618f572.exe

  • Size

    65KB

  • Sample

    241226-bnsjfstleq

  • MD5

    139838372dab0e929e5fc5d8f21c299d

  • SHA1

    7d2e92864da8a9b887ef4bfb8b1f24b4773bb9ee

  • SHA256

    5990cb78e84839e7a1682a30535a628dbc90affea89d740bc49a10197618f572

  • SHA512

    f99566ec33416dc9f40ed36e852eb40153fe525d0fd22769344af54c732aff76baeb73438acf754b685965695cfe8923fa022987e40c8716317d76e18ba9de3f

  • SSDEEP

    1536:CSOaid5251YFwjbrMe2VXOAmniUXxUAsJSIAuJWZJn:LE2PYF6bYOhrXMeZ5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      5990cb78e84839e7a1682a30535a628dbc90affea89d740bc49a10197618f572.exe

    • Size

      65KB

    • MD5

      139838372dab0e929e5fc5d8f21c299d

    • SHA1

      7d2e92864da8a9b887ef4bfb8b1f24b4773bb9ee

    • SHA256

      5990cb78e84839e7a1682a30535a628dbc90affea89d740bc49a10197618f572

    • SHA512

      f99566ec33416dc9f40ed36e852eb40153fe525d0fd22769344af54c732aff76baeb73438acf754b685965695cfe8923fa022987e40c8716317d76e18ba9de3f

    • SSDEEP

      1536:CSOaid5251YFwjbrMe2VXOAmniUXxUAsJSIAuJWZJn:LE2PYF6bYOhrXMeZ5

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks