General

  • Target

    4d64a1cfe124b2432a812cf8c8bfeffeccc1054e4eb379fba90f1429340d6b62.exe

  • Size

    65KB

  • Sample

    241226-ghlfvaykdp

  • MD5

    37a1ee80fcaa563b0518f3082f2a165f

  • SHA1

    93d831651727b95e9e1076905cbebc455fd5b4b3

  • SHA256

    4d64a1cfe124b2432a812cf8c8bfeffeccc1054e4eb379fba90f1429340d6b62

  • SHA512

    6449db494f3ccfc5358b8e02395843502c628332b6b68acd453a5143505006014d42e7480f3f82fd45aae4d91b229fe7d8ab41b553814a06d5ba131faeabf369

  • SSDEEP

    1536:glZaWkTomWaD3A5J5Eb7kDWbFlEqI8TriNDsPp:+a9Tt2J5Q7kDWb/NiNDG

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4d64a1cfe124b2432a812cf8c8bfeffeccc1054e4eb379fba90f1429340d6b62.exe

    • Size

      65KB

    • MD5

      37a1ee80fcaa563b0518f3082f2a165f

    • SHA1

      93d831651727b95e9e1076905cbebc455fd5b4b3

    • SHA256

      4d64a1cfe124b2432a812cf8c8bfeffeccc1054e4eb379fba90f1429340d6b62

    • SHA512

      6449db494f3ccfc5358b8e02395843502c628332b6b68acd453a5143505006014d42e7480f3f82fd45aae4d91b229fe7d8ab41b553814a06d5ba131faeabf369

    • SSDEEP

      1536:glZaWkTomWaD3A5J5Eb7kDWbFlEqI8TriNDsPp:+a9Tt2J5Q7kDWb/NiNDG

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks