General

  • Target

    b0c6d4c38664b3916c449c23b5a83c7161a80cfea7fec088305ee6e93080429dN.exe

  • Size

    65KB

  • Sample

    241226-yef6dswqaw

  • MD5

    2c0ce18503c95b20dd009dc6153f2710

  • SHA1

    0983b8648f9efe6e7e1e0785ddb2b7c4aebc9a5e

  • SHA256

    b0c6d4c38664b3916c449c23b5a83c7161a80cfea7fec088305ee6e93080429d

  • SHA512

    d6e0553f1b25152d072825a5c0f3774a3f56f8184c197bbdbd43a5b80d68364bb92488d8ebdad41af4a44847ddcc0eb9dc523d6a25e7f7d58c8b816f86cdd230

  • SSDEEP

    1536:B2ZPVzk49aCcXs8v0p+IwPQfmh2bjMmshJl/5:AdpMDv0HJBHWB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      b0c6d4c38664b3916c449c23b5a83c7161a80cfea7fec088305ee6e93080429dN.exe

    • Size

      65KB

    • MD5

      2c0ce18503c95b20dd009dc6153f2710

    • SHA1

      0983b8648f9efe6e7e1e0785ddb2b7c4aebc9a5e

    • SHA256

      b0c6d4c38664b3916c449c23b5a83c7161a80cfea7fec088305ee6e93080429d

    • SHA512

      d6e0553f1b25152d072825a5c0f3774a3f56f8184c197bbdbd43a5b80d68364bb92488d8ebdad41af4a44847ddcc0eb9dc523d6a25e7f7d58c8b816f86cdd230

    • SSDEEP

      1536:B2ZPVzk49aCcXs8v0p+IwPQfmh2bjMmshJl/5:AdpMDv0HJBHWB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks