General

  • Target

    95a29c1b0ffc3192420bbe88f2ac8465000c7330d241df7ff625fa5f1747341b.exe

  • Size

    65KB

  • Sample

    241226-hneqxszjgm

  • MD5

    c41eef1c3b4089ea54be3002d00a7f9f

  • SHA1

    765ea1a46ea9a64f32e74ab8fbee9b1ced3a2f9b

  • SHA256

    95a29c1b0ffc3192420bbe88f2ac8465000c7330d241df7ff625fa5f1747341b

  • SHA512

    1a7220b92b0b807cf040cdb9f3205a9e3c602b08276fe85e83357bb939149698af0d30a18264406948cb8d682faadf017e919f8fa2c4968995a692e9805a74ec

  • SSDEEP

    1536:sJEPuog/9rUSEODWLINa3+JQqpQSy5vj0CB5+gcs:sJ1ZUCDuINa+W1jv5+i

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      95a29c1b0ffc3192420bbe88f2ac8465000c7330d241df7ff625fa5f1747341b.exe

    • Size

      65KB

    • MD5

      c41eef1c3b4089ea54be3002d00a7f9f

    • SHA1

      765ea1a46ea9a64f32e74ab8fbee9b1ced3a2f9b

    • SHA256

      95a29c1b0ffc3192420bbe88f2ac8465000c7330d241df7ff625fa5f1747341b

    • SHA512

      1a7220b92b0b807cf040cdb9f3205a9e3c602b08276fe85e83357bb939149698af0d30a18264406948cb8d682faadf017e919f8fa2c4968995a692e9805a74ec

    • SSDEEP

      1536:sJEPuog/9rUSEODWLINa3+JQqpQSy5vj0CB5+gcs:sJ1ZUCDuINa+W1jv5+i

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks