General

  • Target

    762c77dac3df240f2dd548ad29b50c952515b6cee0076fd8159a8af37749df38N.exe

  • Size

    120KB

  • Sample

    241230-vrvyja1jbl

  • MD5

    f996cd58ba8593422c2d6b554e583350

  • SHA1

    d6b13174d1ce552ce3aaae54de7e1c3ba9547c15

  • SHA256

    762c77dac3df240f2dd548ad29b50c952515b6cee0076fd8159a8af37749df38

  • SHA512

    bda08a5f258636aea2049ef6b61e4b60f053d7540e313b057a49d2cfb79a768074d45b15c054ef1d9a829581b7bbff60da9dcc646a45557f1438aecca4658782

  • SSDEEP

    1536:Ug/JzJ21qktSQN/XJvmqvIALdDAvZfBFOpwY/a3p9YoQ8VNieAhE8Ja3R:z/FJ2ntSQN/Xhmqvz+ffwa5PIeAhEF

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      762c77dac3df240f2dd548ad29b50c952515b6cee0076fd8159a8af37749df38N.exe

    • Size

      120KB

    • MD5

      f996cd58ba8593422c2d6b554e583350

    • SHA1

      d6b13174d1ce552ce3aaae54de7e1c3ba9547c15

    • SHA256

      762c77dac3df240f2dd548ad29b50c952515b6cee0076fd8159a8af37749df38

    • SHA512

      bda08a5f258636aea2049ef6b61e4b60f053d7540e313b057a49d2cfb79a768074d45b15c054ef1d9a829581b7bbff60da9dcc646a45557f1438aecca4658782

    • SSDEEP

      1536:Ug/JzJ21qktSQN/XJvmqvIALdDAvZfBFOpwY/a3p9YoQ8VNieAhE8Ja3R:z/FJ2ntSQN/Xhmqvz+ffwa5PIeAhEF

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks