General

  • Target

    6eb2ca20a146835e3572169f310be3f08e6ccf25e5e61d79302e5746262b8884.exe

  • Size

    120KB

  • Sample

    241230-q91vaayrg1

  • MD5

    cd6e40ca47c38bd5dbdcbdc3d48ba9e1

  • SHA1

    cbe2b319a7c035655933c0c53dd8ee87812bb74a

  • SHA256

    6eb2ca20a146835e3572169f310be3f08e6ccf25e5e61d79302e5746262b8884

  • SHA512

    c85503d3839e3af78619ebd97f69074aea6154ad6dc5e9002bee1167c417ef944790860c10116f150684a4130578df87739c29662b905e1c6f8106f98c3471f7

  • SSDEEP

    1536:6v0GWwxXsfqK7LYNLdXl9ef9TiNr1ZJ+EAHW1gXQz3x9U7emjHKDl:s0GWw9dKXYNJXlEF2Nr1X+E2A9yeKHS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      6eb2ca20a146835e3572169f310be3f08e6ccf25e5e61d79302e5746262b8884.exe

    • Size

      120KB

    • MD5

      cd6e40ca47c38bd5dbdcbdc3d48ba9e1

    • SHA1

      cbe2b319a7c035655933c0c53dd8ee87812bb74a

    • SHA256

      6eb2ca20a146835e3572169f310be3f08e6ccf25e5e61d79302e5746262b8884

    • SHA512

      c85503d3839e3af78619ebd97f69074aea6154ad6dc5e9002bee1167c417ef944790860c10116f150684a4130578df87739c29662b905e1c6f8106f98c3471f7

    • SSDEEP

      1536:6v0GWwxXsfqK7LYNLdXl9ef9TiNr1ZJ+EAHW1gXQz3x9U7emjHKDl:s0GWw9dKXYNJXlEF2Nr1X+E2A9yeKHS

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks