General

  • Target

    85f1f77a4bedf008a7606dfc3b5a1d9cf87cc2f66c6341cf27767bcf15fbf250.exe

  • Size

    65KB

  • Sample

    241226-lr7gwssper

  • MD5

    f70a73bd2d18c9bf587005c6a20c1f1a

  • SHA1

    d2d95134532e6cb2eb7bf5d08a6e11c06ff5b9d6

  • SHA256

    85f1f77a4bedf008a7606dfc3b5a1d9cf87cc2f66c6341cf27767bcf15fbf250

  • SHA512

    69942132504dac1984b8e6282f3756adc0fcb8fb44d90286ff49168855924f6a194f7d1d2fabe8ba61fde92cc6fcd46a491ba71312cd47db392c7281b792316b

  • SSDEEP

    1536:7U1h1pna+mMt/HQi/7U8gkhmVpVWO/JxkFs1n6M:o1ZnLzt/wk7tgsoVRBma0M

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      85f1f77a4bedf008a7606dfc3b5a1d9cf87cc2f66c6341cf27767bcf15fbf250.exe

    • Size

      65KB

    • MD5

      f70a73bd2d18c9bf587005c6a20c1f1a

    • SHA1

      d2d95134532e6cb2eb7bf5d08a6e11c06ff5b9d6

    • SHA256

      85f1f77a4bedf008a7606dfc3b5a1d9cf87cc2f66c6341cf27767bcf15fbf250

    • SHA512

      69942132504dac1984b8e6282f3756adc0fcb8fb44d90286ff49168855924f6a194f7d1d2fabe8ba61fde92cc6fcd46a491ba71312cd47db392c7281b792316b

    • SSDEEP

      1536:7U1h1pna+mMt/HQi/7U8gkhmVpVWO/JxkFs1n6M:o1ZnLzt/wk7tgsoVRBma0M

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks