General

  • Target

    e8311a96ff133228f046f24e32d9e34f9712fa5d8d06fa7a820e044f21ddb37a.exe

  • Size

    120KB

  • Sample

    241226-yxme5axrgq

  • MD5

    8a5abb8fa71c6700510f6e128504977a

  • SHA1

    60dc2c03116c64c498cded1c4516602381e50c1a

  • SHA256

    e8311a96ff133228f046f24e32d9e34f9712fa5d8d06fa7a820e044f21ddb37a

  • SHA512

    0ecf4afbfbe119540254ea3e2abea467ec6b7737c15c52473e15a53098676f0cfc4930867f05ab23e3fad62fcd37d8a6b5455aff7750f7741d5a5d40d4915620

  • SSDEEP

    1536:u49NCEapfeZnWSkBUGJ32Wlr+EchS7ibXMfmleUcN+sE57mn+3gQuOWSgG0CCEQm:V9c9qFk3p2W1ZcJbeQeUi+H2q/WSgJET

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      e8311a96ff133228f046f24e32d9e34f9712fa5d8d06fa7a820e044f21ddb37a.exe

    • Size

      120KB

    • MD5

      8a5abb8fa71c6700510f6e128504977a

    • SHA1

      60dc2c03116c64c498cded1c4516602381e50c1a

    • SHA256

      e8311a96ff133228f046f24e32d9e34f9712fa5d8d06fa7a820e044f21ddb37a

    • SHA512

      0ecf4afbfbe119540254ea3e2abea467ec6b7737c15c52473e15a53098676f0cfc4930867f05ab23e3fad62fcd37d8a6b5455aff7750f7741d5a5d40d4915620

    • SSDEEP

      1536:u49NCEapfeZnWSkBUGJ32Wlr+EchS7ibXMfmleUcN+sE57mn+3gQuOWSgG0CCEQm:V9c9qFk3p2W1ZcJbeQeUi+H2q/WSgJET

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks