General

  • Target

    8dd7421e4132520ea7a5055e0ccfb7050e1255e2f117ac393242804eb0685d9aN.exe

  • Size

    120KB

  • Sample

    241230-vgn28szpdm

  • MD5

    481003003903f4847cf68640eefb9af0

  • SHA1

    f1fa71b857aadef84cda592d75ad719e34b355d3

  • SHA256

    8dd7421e4132520ea7a5055e0ccfb7050e1255e2f117ac393242804eb0685d9a

  • SHA512

    13066331883d1a83a14c69941c82fb8199c3774632728549f2add92bfad9d86590905f3cf4698c5a8bbfd8d9330189b026ce8aab7fa2a2033d604584029d4595

  • SSDEEP

    3072:IhnMttJyxvM2+7Haak5XpaTcs423ox3ppB:IWfJyxvML7HwHkcA3MB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8dd7421e4132520ea7a5055e0ccfb7050e1255e2f117ac393242804eb0685d9aN.exe

    • Size

      120KB

    • MD5

      481003003903f4847cf68640eefb9af0

    • SHA1

      f1fa71b857aadef84cda592d75ad719e34b355d3

    • SHA256

      8dd7421e4132520ea7a5055e0ccfb7050e1255e2f117ac393242804eb0685d9a

    • SHA512

      13066331883d1a83a14c69941c82fb8199c3774632728549f2add92bfad9d86590905f3cf4698c5a8bbfd8d9330189b026ce8aab7fa2a2033d604584029d4595

    • SSDEEP

      3072:IhnMttJyxvM2+7Haak5XpaTcs423ox3ppB:IWfJyxvML7HwHkcA3MB

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks