General

  • Target

    86358649901613e20392b42e4ba94369553ec755b7cdaf79b70daaf0cdb9d917.exe

  • Size

    65KB

  • Sample

    241226-c5s2zsvnhq

  • MD5

    74c9b92d108dbc3d98d8716024f663c1

  • SHA1

    8e9602534203ed8e7af1f8e16c523003635b1698

  • SHA256

    86358649901613e20392b42e4ba94369553ec755b7cdaf79b70daaf0cdb9d917

  • SHA512

    e5880f1a81904a68d5f8fa5b65188de09f68ef7f75266fab01d7af6ef7403d963af3f01952e8fb253a455f8a0879a4997c28554f94cd948f901734c943039ee9

  • SSDEEP

    1536:sBZsfDfTl0RfnqWXgj7THUIeuDFtOdNFO6oETfAJ+cbB:8ZsTY/qyyPHsytqO6P0kcbB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      86358649901613e20392b42e4ba94369553ec755b7cdaf79b70daaf0cdb9d917.exe

    • Size

      65KB

    • MD5

      74c9b92d108dbc3d98d8716024f663c1

    • SHA1

      8e9602534203ed8e7af1f8e16c523003635b1698

    • SHA256

      86358649901613e20392b42e4ba94369553ec755b7cdaf79b70daaf0cdb9d917

    • SHA512

      e5880f1a81904a68d5f8fa5b65188de09f68ef7f75266fab01d7af6ef7403d963af3f01952e8fb253a455f8a0879a4997c28554f94cd948f901734c943039ee9

    • SSDEEP

      1536:sBZsfDfTl0RfnqWXgj7THUIeuDFtOdNFO6oETfAJ+cbB:8ZsTY/qyyPHsytqO6P0kcbB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks