General

  • Target

    253bbdeea992ed994bd08f2c5e3ca9d65a2635c3186ce361b389246900b68712.exe

  • Size

    97KB

  • Sample

    241226-reqlhaxkft

  • MD5

    950eae708ab3b8f5810a78f4d72ef3ad

  • SHA1

    81abe9bf6fce1b46907e84382ea7352e0ae7f889

  • SHA256

    253bbdeea992ed994bd08f2c5e3ca9d65a2635c3186ce361b389246900b68712

  • SHA512

    06535e621d141a869f2501afc34bc48450001b1e4b616debbe0c544bb4340dd8343fc99543b70a974f387d81a19013dcf7c4ceb999b5d9214d71e1bffefc2f7b

  • SSDEEP

    3072:zM/9+89EX7UU258RCgEZf8iH1rWLRC+O1la:EDErv2q0ZkiVrW9C+Ola

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      253bbdeea992ed994bd08f2c5e3ca9d65a2635c3186ce361b389246900b68712.exe

    • Size

      97KB

    • MD5

      950eae708ab3b8f5810a78f4d72ef3ad

    • SHA1

      81abe9bf6fce1b46907e84382ea7352e0ae7f889

    • SHA256

      253bbdeea992ed994bd08f2c5e3ca9d65a2635c3186ce361b389246900b68712

    • SHA512

      06535e621d141a869f2501afc34bc48450001b1e4b616debbe0c544bb4340dd8343fc99543b70a974f387d81a19013dcf7c4ceb999b5d9214d71e1bffefc2f7b

    • SSDEEP

      3072:zM/9+89EX7UU258RCgEZf8iH1rWLRC+O1la:EDErv2q0ZkiVrW9C+Ola

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks