General

  • Target

    4c8b0224515f136dd4c1d4a622d69276070425f669637c6a8ad26b0b5aa92ff6N.exe

  • Size

    65KB

  • Sample

    241226-n3y11avmbw

  • MD5

    281dbb01e681af67d43112beb0c38150

  • SHA1

    ea0fd95703e965650e5384edad6a4380a46ce964

  • SHA256

    4c8b0224515f136dd4c1d4a622d69276070425f669637c6a8ad26b0b5aa92ff6

  • SHA512

    2bec97c7e0599c1cf56ef41a1fa0978129b9c0f65b5081a4fbffbb31a8a40d2b6a7ecd542af2f50a54d5e3c50cbd7524a731f50e06557568e4a874e61bb06b26

  • SSDEEP

    1536:HQC0bSiuH2koxS9SCTMQg0ydxWonHbqOrvk0OIEUVQDoKj6vx:Hv02PWks+MhrxWoRrvkXIEJ8K+vx

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4c8b0224515f136dd4c1d4a622d69276070425f669637c6a8ad26b0b5aa92ff6N.exe

    • Size

      65KB

    • MD5

      281dbb01e681af67d43112beb0c38150

    • SHA1

      ea0fd95703e965650e5384edad6a4380a46ce964

    • SHA256

      4c8b0224515f136dd4c1d4a622d69276070425f669637c6a8ad26b0b5aa92ff6

    • SHA512

      2bec97c7e0599c1cf56ef41a1fa0978129b9c0f65b5081a4fbffbb31a8a40d2b6a7ecd542af2f50a54d5e3c50cbd7524a731f50e06557568e4a874e61bb06b26

    • SSDEEP

      1536:HQC0bSiuH2koxS9SCTMQg0ydxWonHbqOrvk0OIEUVQDoKj6vx:Hv02PWks+MhrxWoRrvkXIEJ8K+vx

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks