General

  • Target

    c4a8e5ef686c63c53a11ddcf9aaeb5f033eeff11ed708ab2da89657e0dd666beN.exe

  • Size

    65KB

  • Sample

    241230-rcclvszjct

  • MD5

    d443fdf609e644ba1e7869007e93d790

  • SHA1

    b2b8ed73e42260e58728727fe6f0f6839e23c759

  • SHA256

    c4a8e5ef686c63c53a11ddcf9aaeb5f033eeff11ed708ab2da89657e0dd666be

  • SHA512

    a90f39fbac9e33a0d9d7c111e9f3e88792dfcc00d9d18540b4333222ecf8c6a14b63a8c72e529212919fb7e6a5cd54541c5d062d2f68225f57c5559157483657

  • SSDEEP

    1536:9VBLN94wsgEvbnoDpgO5AxBMrBeM4srV8OtS6H2r74T/RHUs:9rvsgEbKpgOzrB184Ld7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c4a8e5ef686c63c53a11ddcf9aaeb5f033eeff11ed708ab2da89657e0dd666beN.exe

    • Size

      65KB

    • MD5

      d443fdf609e644ba1e7869007e93d790

    • SHA1

      b2b8ed73e42260e58728727fe6f0f6839e23c759

    • SHA256

      c4a8e5ef686c63c53a11ddcf9aaeb5f033eeff11ed708ab2da89657e0dd666be

    • SHA512

      a90f39fbac9e33a0d9d7c111e9f3e88792dfcc00d9d18540b4333222ecf8c6a14b63a8c72e529212919fb7e6a5cd54541c5d062d2f68225f57c5559157483657

    • SSDEEP

      1536:9VBLN94wsgEvbnoDpgO5AxBMrBeM4srV8OtS6H2r74T/RHUs:9rvsgEbKpgOzrB184Ld7

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks