General

  • Target

    561ade57ecf64feeeaf005e6ea87ba9bafc85e34b994411fc721484787a1d500.exe

  • Size

    120KB

  • Sample

    241226-y379sayjfw

  • MD5

    27606f7d757416d97ff6d8d19fb89998

  • SHA1

    7e1a8915d2a937079f9b75de3c2ff1f3812088ea

  • SHA256

    561ade57ecf64feeeaf005e6ea87ba9bafc85e34b994411fc721484787a1d500

  • SHA512

    c6015f89594e19bbaa4ca447ddabb50b21e75763b81225a1669385363756bb5aae1b909c72e70b7ab0814541cd3eab894233eaa1d52dd9e84ded8399380f168d

  • SSDEEP

    3072:DurJV73HZfBR7qQEgUCiJTmv7jUcVzh7R:UL5f7jETCiYnj3l

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      561ade57ecf64feeeaf005e6ea87ba9bafc85e34b994411fc721484787a1d500.exe

    • Size

      120KB

    • MD5

      27606f7d757416d97ff6d8d19fb89998

    • SHA1

      7e1a8915d2a937079f9b75de3c2ff1f3812088ea

    • SHA256

      561ade57ecf64feeeaf005e6ea87ba9bafc85e34b994411fc721484787a1d500

    • SHA512

      c6015f89594e19bbaa4ca447ddabb50b21e75763b81225a1669385363756bb5aae1b909c72e70b7ab0814541cd3eab894233eaa1d52dd9e84ded8399380f168d

    • SSDEEP

      3072:DurJV73HZfBR7qQEgUCiJTmv7jUcVzh7R:UL5f7jETCiYnj3l

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks