General

  • Target

    2001864f0b752fc7b56debc9cd6694ea55dab1b029d1870c45aa520640ba1f86.exe

  • Size

    128KB

  • Sample

    241230-xlt56awnhs

  • MD5

    8ca0914f53557231e967e9e5adea4770

  • SHA1

    b613395b55895f0292b6876347d5ad038f17b034

  • SHA256

    2001864f0b752fc7b56debc9cd6694ea55dab1b029d1870c45aa520640ba1f86

  • SHA512

    62f5d4942c1677d6cee79b431e242e145515a13cd6eda3331ce4769ab09ec54b5999cafe26313b3cc1f0923ed9265bdf2f28175e31723fc3a17019ee54d03bdf

  • SSDEEP

    1536:1Jf83W8W60IL26Ap8iJ9+pvI8B8FuuKk1p0AxQjKP3xNL+vljZuIkBbmFZ3Oz+Ue:1JCD548iJK+cDm0KNxkllFFxOFdE

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2001864f0b752fc7b56debc9cd6694ea55dab1b029d1870c45aa520640ba1f86.exe

    • Size

      128KB

    • MD5

      8ca0914f53557231e967e9e5adea4770

    • SHA1

      b613395b55895f0292b6876347d5ad038f17b034

    • SHA256

      2001864f0b752fc7b56debc9cd6694ea55dab1b029d1870c45aa520640ba1f86

    • SHA512

      62f5d4942c1677d6cee79b431e242e145515a13cd6eda3331ce4769ab09ec54b5999cafe26313b3cc1f0923ed9265bdf2f28175e31723fc3a17019ee54d03bdf

    • SSDEEP

      1536:1Jf83W8W60IL26Ap8iJ9+pvI8B8FuuKk1p0AxQjKP3xNL+vljZuIkBbmFZ3Oz+Ue:1JCD548iJK+cDm0KNxkllFFxOFdE

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks