General

  • Target

    ca91af8d81a866158af4d25ba67d630f6e99c76eb6c0802ef3c186a7da8cba22.exe

  • Size

    65KB

  • Sample

    241226-ytaxxsxndy

  • MD5

    553cd61f85f881fd782828e1ec03f6ba

  • SHA1

    9d394c6d24197a58f1007f17294996ab25e3673a

  • SHA256

    ca91af8d81a866158af4d25ba67d630f6e99c76eb6c0802ef3c186a7da8cba22

  • SHA512

    462725edfe5db857a7758f37fce01e5a075907996c12088c5fb80ccc01de0fd44bf73caf85cd5ddae2f12d3b47aa108051b96bf80407bed11fa07ebe2f60ff5a

  • SSDEEP

    1536:HQC0bSiuH2koxS9SCTMQg0ydxWonHbqOrvk0OIEUVQDoKj6vb:Hv02PWks+MhrxWoRrvkXIEJ8K+vb

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ca91af8d81a866158af4d25ba67d630f6e99c76eb6c0802ef3c186a7da8cba22.exe

    • Size

      65KB

    • MD5

      553cd61f85f881fd782828e1ec03f6ba

    • SHA1

      9d394c6d24197a58f1007f17294996ab25e3673a

    • SHA256

      ca91af8d81a866158af4d25ba67d630f6e99c76eb6c0802ef3c186a7da8cba22

    • SHA512

      462725edfe5db857a7758f37fce01e5a075907996c12088c5fb80ccc01de0fd44bf73caf85cd5ddae2f12d3b47aa108051b96bf80407bed11fa07ebe2f60ff5a

    • SSDEEP

      1536:HQC0bSiuH2koxS9SCTMQg0ydxWonHbqOrvk0OIEUVQDoKj6vb:Hv02PWks+MhrxWoRrvkXIEJ8K+vb

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks