General

  • Target

    6afebefca6b9a0b61790b2c6ce0730d086955c88350cf8b8c56c99b2f401c37aN.exe

  • Size

    120KB

  • Sample

    241230-12bwas1lfm

  • MD5

    6010ca3b8473a728e365657c8151b320

  • SHA1

    d64564dd75a68847c1ea9f3b63f08e22e6cfd02f

  • SHA256

    6afebefca6b9a0b61790b2c6ce0730d086955c88350cf8b8c56c99b2f401c37a

  • SHA512

    3b763fddf1fe0247e7be7644bba30998cca3db19403274a493e694a008883d609df3b7aa7b3497a2ea1323458f6c5944e6bafbda2c699771ad45b5498960e31c

  • SSDEEP

    1536:BJMmGWYxWpRz9wF5Yp6zGYZFl8FVJtiomoRRbvbmYv/NiZLrKRVsnsgsf9SWo:BJ4yWsIiYt8Comovbvb7HUxKv/x9O

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      6afebefca6b9a0b61790b2c6ce0730d086955c88350cf8b8c56c99b2f401c37aN.exe

    • Size

      120KB

    • MD5

      6010ca3b8473a728e365657c8151b320

    • SHA1

      d64564dd75a68847c1ea9f3b63f08e22e6cfd02f

    • SHA256

      6afebefca6b9a0b61790b2c6ce0730d086955c88350cf8b8c56c99b2f401c37a

    • SHA512

      3b763fddf1fe0247e7be7644bba30998cca3db19403274a493e694a008883d609df3b7aa7b3497a2ea1323458f6c5944e6bafbda2c699771ad45b5498960e31c

    • SSDEEP

      1536:BJMmGWYxWpRz9wF5Yp6zGYZFl8FVJtiomoRRbvbmYv/NiZLrKRVsnsgsf9SWo:BJ4yWsIiYt8Comovbvb7HUxKv/x9O

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks