General

  • Target

    a663268f3921c50f9219543ef361ca0845f36397f12bf0b5e6b5e65ecd8977b4.exe

  • Size

    120KB

  • Sample

    241230-qkx24aymax

  • MD5

    e2ae7a3c25c63697183a2333f96ad23c

  • SHA1

    befdaae7e28ca63a907fdc7eb1cf0abaf52cd1cb

  • SHA256

    a663268f3921c50f9219543ef361ca0845f36397f12bf0b5e6b5e65ecd8977b4

  • SHA512

    fab25328a7ed18bf39422c004ae4714f1f5d127b74a71f22bccdc20f82ee29cddac767542f356a9a05f322997710312dbaa83ca329acf9b304e7c762fbdc6964

  • SSDEEP

    3072:spQG4mKVGceRPNoc3Omks+1c0yM6KKsC4aMayz+LRpG:eV4zBe8c3ysOyM6sC4aMayaLjG

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a663268f3921c50f9219543ef361ca0845f36397f12bf0b5e6b5e65ecd8977b4.exe

    • Size

      120KB

    • MD5

      e2ae7a3c25c63697183a2333f96ad23c

    • SHA1

      befdaae7e28ca63a907fdc7eb1cf0abaf52cd1cb

    • SHA256

      a663268f3921c50f9219543ef361ca0845f36397f12bf0b5e6b5e65ecd8977b4

    • SHA512

      fab25328a7ed18bf39422c004ae4714f1f5d127b74a71f22bccdc20f82ee29cddac767542f356a9a05f322997710312dbaa83ca329acf9b304e7c762fbdc6964

    • SSDEEP

      3072:spQG4mKVGceRPNoc3Omks+1c0yM6KKsC4aMayz+LRpG:eV4zBe8c3ysOyM6sC4aMayaLjG

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks