General

  • Target

    8185a0013a9c2ef1dc4c15303fb15eb978c7cf0007e49213b260786c4df48fa9N.exe

  • Size

    65KB

  • Sample

    241226-z1bcpszqhk

  • MD5

    b014d5663129d617cc5a40a44a3e4500

  • SHA1

    3c5b6340499df50fc204b94f4793e8181959d135

  • SHA256

    8185a0013a9c2ef1dc4c15303fb15eb978c7cf0007e49213b260786c4df48fa9

  • SHA512

    0cecf1d5187478c9463a37b8b40941e2fdc41e88f99386cd877aefa7cf1ee4a7c5e19cb61c552c711945370fd1f165c45202b94600c48cef942529ec3aa01281

  • SSDEEP

    1536:sBZsfDfTl0RfnqWXgj7THUIeuDFtOdNFO6oETfAJ+cbL:8ZsTY/qyyPHsytqO6P0kcbL

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8185a0013a9c2ef1dc4c15303fb15eb978c7cf0007e49213b260786c4df48fa9N.exe

    • Size

      65KB

    • MD5

      b014d5663129d617cc5a40a44a3e4500

    • SHA1

      3c5b6340499df50fc204b94f4793e8181959d135

    • SHA256

      8185a0013a9c2ef1dc4c15303fb15eb978c7cf0007e49213b260786c4df48fa9

    • SHA512

      0cecf1d5187478c9463a37b8b40941e2fdc41e88f99386cd877aefa7cf1ee4a7c5e19cb61c552c711945370fd1f165c45202b94600c48cef942529ec3aa01281

    • SSDEEP

      1536:sBZsfDfTl0RfnqWXgj7THUIeuDFtOdNFO6oETfAJ+cbL:8ZsTY/qyyPHsytqO6P0kcbL

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks