General

  • Target

    af74cf677a1ff32b83152e407b33660e8d0aa6c6c01e11b7a669b69273c6dd92.exe

  • Size

    65KB

  • Sample

    241226-fbrhvaxjey

  • MD5

    212162916c60f70daa3a75c40e61500f

  • SHA1

    986561b1454e0a771fddfa84384bcc8fa40c801a

  • SHA256

    af74cf677a1ff32b83152e407b33660e8d0aa6c6c01e11b7a669b69273c6dd92

  • SHA512

    8998327525d46ef27687b77239296f6c2f6fdc478a46d75eb99d608134e90f03f0fed8a098b89f53a3b3a8b38ae91a01ac8c636249e8fcade675cb71fbba319d

  • SSDEEP

    1536:iHUn67HlJiqqFeac/Kh6+ybA4tBnGDkf8xPOaD+rpVtZuzJ1zwnw9:iHk67HDlqFoC9+AdDkfZa+pVOwa

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      af74cf677a1ff32b83152e407b33660e8d0aa6c6c01e11b7a669b69273c6dd92.exe

    • Size

      65KB

    • MD5

      212162916c60f70daa3a75c40e61500f

    • SHA1

      986561b1454e0a771fddfa84384bcc8fa40c801a

    • SHA256

      af74cf677a1ff32b83152e407b33660e8d0aa6c6c01e11b7a669b69273c6dd92

    • SHA512

      8998327525d46ef27687b77239296f6c2f6fdc478a46d75eb99d608134e90f03f0fed8a098b89f53a3b3a8b38ae91a01ac8c636249e8fcade675cb71fbba319d

    • SSDEEP

      1536:iHUn67HlJiqqFeac/Kh6+ybA4tBnGDkf8xPOaD+rpVtZuzJ1zwnw9:iHk67HDlqFoC9+AdDkfZa+pVOwa

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks