General

  • Target

    51347e5ee48887e493c280c9b4154c602b221401b35e83b5214a755cc235a22aN.exe

  • Size

    1.2MB

  • Sample

    241226-f3rmxsxqfp

  • MD5

    bc84a9c36e0f9bd8eff47238ddfebbb0

  • SHA1

    31d2c2a4a3f140ecff9f5adaedc8f8ba7d77a8a4

  • SHA256

    51347e5ee48887e493c280c9b4154c602b221401b35e83b5214a755cc235a22a

  • SHA512

    1ec5a1aa3acb7b9ac9c3308db9c84c13b3c2cb3eb531ae4882f2675eb280dc69fbb0ac5dcf32cc4b0fd9a0e52d28fc54c8c33260fa0d51622296dcfc756e6261

  • SSDEEP

    24576:NII2mRVMuLi/mDnICLJ4gxqBei7/ATDNoo3cK0Ef2gsO4KbPR:omRV247qBei7/ATDNo2+Ef2gsO4KbPR

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      51347e5ee48887e493c280c9b4154c602b221401b35e83b5214a755cc235a22aN.exe

    • Size

      1.2MB

    • MD5

      bc84a9c36e0f9bd8eff47238ddfebbb0

    • SHA1

      31d2c2a4a3f140ecff9f5adaedc8f8ba7d77a8a4

    • SHA256

      51347e5ee48887e493c280c9b4154c602b221401b35e83b5214a755cc235a22a

    • SHA512

      1ec5a1aa3acb7b9ac9c3308db9c84c13b3c2cb3eb531ae4882f2675eb280dc69fbb0ac5dcf32cc4b0fd9a0e52d28fc54c8c33260fa0d51622296dcfc756e6261

    • SSDEEP

      24576:NII2mRVMuLi/mDnICLJ4gxqBei7/ATDNoo3cK0Ef2gsO4KbPR:omRV247qBei7/ATDNo2+Ef2gsO4KbPR

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks