General

  • Target

    a2cee9843585fccaa8e0bc5f61b687c131de34dcc1a8a07026e01b693b9b0494N.exe

  • Size

    65KB

  • Sample

    241226-sc7yfaylem

  • MD5

    184a1249f445d7c3cf5fe4c987ec58e0

  • SHA1

    f7d3fb5e6d2ac1916fdacb402c6a28034af40f54

  • SHA256

    a2cee9843585fccaa8e0bc5f61b687c131de34dcc1a8a07026e01b693b9b0494

  • SHA512

    13c9fd681098b3d4b07d2d28aee11e5748172210ccf3884954e2279dea2b097c294f615b3a641d2f004d28debc22176cc683ba40e471d45b1c0584368d103b0e

  • SSDEEP

    1536:RcS8yFuBhdSYfi9it00qThGx+rB2ALBPuCctztyfQjC9ZTi:RcmFwtqIt00qThGsrBdmyYk8

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a2cee9843585fccaa8e0bc5f61b687c131de34dcc1a8a07026e01b693b9b0494N.exe

    • Size

      65KB

    • MD5

      184a1249f445d7c3cf5fe4c987ec58e0

    • SHA1

      f7d3fb5e6d2ac1916fdacb402c6a28034af40f54

    • SHA256

      a2cee9843585fccaa8e0bc5f61b687c131de34dcc1a8a07026e01b693b9b0494

    • SHA512

      13c9fd681098b3d4b07d2d28aee11e5748172210ccf3884954e2279dea2b097c294f615b3a641d2f004d28debc22176cc683ba40e471d45b1c0584368d103b0e

    • SSDEEP

      1536:RcS8yFuBhdSYfi9it00qThGx+rB2ALBPuCctztyfQjC9ZTi:RcmFwtqIt00qThGsrBdmyYk8

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks