General

  • Target

    a7f1fffcc3393d3e0d66d8a98f47ab9a04192312e2f4ea6b66c8eebeb5185302.exe

  • Size

    65KB

  • Sample

    241226-xb2ggsvmfn

  • MD5

    60f424103069b98f8b7b58f034bae7cc

  • SHA1

    14844c7c28a3d24fe5cfb4a2ef57430e3ed8d853

  • SHA256

    a7f1fffcc3393d3e0d66d8a98f47ab9a04192312e2f4ea6b66c8eebeb5185302

  • SHA512

    fce00e687425ec69fe590595a998aeae6f1329910bf25bf7e89d3cebc6487d8983f075623a265a9da826139d6a9238015d6105518f1d4ed821f34541c1b30139

  • SSDEEP

    1536:6T6aAniMQK+fNQnu/wNBoRWG8KugWpM1xoDSYcKTrDuJp:6OviMQKKJ+KrRKKszur

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a7f1fffcc3393d3e0d66d8a98f47ab9a04192312e2f4ea6b66c8eebeb5185302.exe

    • Size

      65KB

    • MD5

      60f424103069b98f8b7b58f034bae7cc

    • SHA1

      14844c7c28a3d24fe5cfb4a2ef57430e3ed8d853

    • SHA256

      a7f1fffcc3393d3e0d66d8a98f47ab9a04192312e2f4ea6b66c8eebeb5185302

    • SHA512

      fce00e687425ec69fe590595a998aeae6f1329910bf25bf7e89d3cebc6487d8983f075623a265a9da826139d6a9238015d6105518f1d4ed821f34541c1b30139

    • SSDEEP

      1536:6T6aAniMQK+fNQnu/wNBoRWG8KugWpM1xoDSYcKTrDuJp:6OviMQKKJ+KrRKKszur

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks