General

  • Target

    8443cdf3e9858a271ad0af65d4e76714fb874ced7c6a52a4ea4225bd280094e7N.exe

  • Size

    120KB

  • Sample

    241230-ryvdssznav

  • MD5

    61f548c0904104195dede2c1c45410c0

  • SHA1

    c322f1da2ebb06f11f04e360675205d12ecfb8c8

  • SHA256

    8443cdf3e9858a271ad0af65d4e76714fb874ced7c6a52a4ea4225bd280094e7

  • SHA512

    c5ab1050d95ed126ac9407b7bfef8dcae45e6a4194d7d3d9d30f7f01d141134836b3b06b0ec68c4ceac180a947acb0f342080c3e7d50d37bab3c8327e3ad40be

  • SSDEEP

    3072:N4Zh5gLRUPXcGZ7RhUIF9ah05E9pMkpFWNwzBpmHC:N4fg+PXcGZNhUIFghUkpQKzP

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8443cdf3e9858a271ad0af65d4e76714fb874ced7c6a52a4ea4225bd280094e7N.exe

    • Size

      120KB

    • MD5

      61f548c0904104195dede2c1c45410c0

    • SHA1

      c322f1da2ebb06f11f04e360675205d12ecfb8c8

    • SHA256

      8443cdf3e9858a271ad0af65d4e76714fb874ced7c6a52a4ea4225bd280094e7

    • SHA512

      c5ab1050d95ed126ac9407b7bfef8dcae45e6a4194d7d3d9d30f7f01d141134836b3b06b0ec68c4ceac180a947acb0f342080c3e7d50d37bab3c8327e3ad40be

    • SSDEEP

      3072:N4Zh5gLRUPXcGZ7RhUIF9ah05E9pMkpFWNwzBpmHC:N4fg+PXcGZNhUIFghUkpQKzP

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks