General

  • Target

    d7036baa688efce86d51a3266c24c1ea8133064614c0f26d99c2ecd779e3517c.exe

  • Size

    120KB

  • Sample

    241230-smmp9a1jes

  • MD5

    269223a59effaac005068f747851473f

  • SHA1

    17f5c7c3786dd4e90695fd118bbd17e5b1996254

  • SHA256

    d7036baa688efce86d51a3266c24c1ea8133064614c0f26d99c2ecd779e3517c

  • SHA512

    ed8f05cb5b500ad39b0524a96144a16f2cf0194ef746c283a45b4b56f965737e250923184d062d27f4f60643dd961ebde77cec33287c73a0d5f50fd398416b05

  • SSDEEP

    1536:sQacd9sE0Pcd0sygp4y5I5kXEA1tkrkU8qU7fGod64+/vbkHkTb6:sQNPsE0Pc+lgOiokH7i8/fx64+34kTW

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d7036baa688efce86d51a3266c24c1ea8133064614c0f26d99c2ecd779e3517c.exe

    • Size

      120KB

    • MD5

      269223a59effaac005068f747851473f

    • SHA1

      17f5c7c3786dd4e90695fd118bbd17e5b1996254

    • SHA256

      d7036baa688efce86d51a3266c24c1ea8133064614c0f26d99c2ecd779e3517c

    • SHA512

      ed8f05cb5b500ad39b0524a96144a16f2cf0194ef746c283a45b4b56f965737e250923184d062d27f4f60643dd961ebde77cec33287c73a0d5f50fd398416b05

    • SSDEEP

      1536:sQacd9sE0Pcd0sygp4y5I5kXEA1tkrkU8qU7fGod64+/vbkHkTb6:sQNPsE0Pc+lgOiokH7i8/fx64+34kTW

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks