General

  • Target

    220593d99b4f108e5ffbbbd8f706a49bf8902e6a97b8ac5376af03d0fb5913f5.exe

  • Size

    65KB

  • Sample

    241226-n46ggavnhl

  • MD5

    595284916f66b48564160467bec9917d

  • SHA1

    3b191afd6c28ea4fafd782225c1228b9465f767a

  • SHA256

    220593d99b4f108e5ffbbbd8f706a49bf8902e6a97b8ac5376af03d0fb5913f5

  • SHA512

    59f05d173397e4efad909df7ecdb7a290bdb83205b8dd7653f922201fa1358c47fa05cc3bbbe20122713a29877936409a2b0ff57a7a874af8df547639efccd43

  • SSDEEP

    1536:0Gh691Wb4UKME+beTEN//yq7SgHHOHcDkEADDun+A+7:0Gw98b4TMzyuKmu8DkL7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      220593d99b4f108e5ffbbbd8f706a49bf8902e6a97b8ac5376af03d0fb5913f5.exe

    • Size

      65KB

    • MD5

      595284916f66b48564160467bec9917d

    • SHA1

      3b191afd6c28ea4fafd782225c1228b9465f767a

    • SHA256

      220593d99b4f108e5ffbbbd8f706a49bf8902e6a97b8ac5376af03d0fb5913f5

    • SHA512

      59f05d173397e4efad909df7ecdb7a290bdb83205b8dd7653f922201fa1358c47fa05cc3bbbe20122713a29877936409a2b0ff57a7a874af8df547639efccd43

    • SSDEEP

      1536:0Gh691Wb4UKME+beTEN//yq7SgHHOHcDkEADDun+A+7:0Gw98b4TMzyuKmu8DkL7

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks