General

  • Target

    fc2399bcd0d035dcf86088e49441325ca88a6b74c2aab2c4949b42d4a954dbc3.exe

  • Size

    120KB

  • Sample

    241231-112qbs1rbs

  • MD5

    d2e6898d2d9598cf73ee4a1709f7eeb3

  • SHA1

    e5ff1d49c2f4ee815e8c1e97ff18e13321f8733c

  • SHA256

    fc2399bcd0d035dcf86088e49441325ca88a6b74c2aab2c4949b42d4a954dbc3

  • SHA512

    d7a4939e0ac77fe6e27ec23b5158c5edb0268df86416bc2a9ab2e6a3ea251cb3df0663bbe5477a8ba42a023aeaa431e9a5bda44f99c96e6c45df27c0249853d6

  • SSDEEP

    3072:XY4qJru5yNIqE9u0va5Ei/Fd2RgLQcYqWFtD6m:XBH5yNIqx95E10QcYqWD

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      fc2399bcd0d035dcf86088e49441325ca88a6b74c2aab2c4949b42d4a954dbc3.exe

    • Size

      120KB

    • MD5

      d2e6898d2d9598cf73ee4a1709f7eeb3

    • SHA1

      e5ff1d49c2f4ee815e8c1e97ff18e13321f8733c

    • SHA256

      fc2399bcd0d035dcf86088e49441325ca88a6b74c2aab2c4949b42d4a954dbc3

    • SHA512

      d7a4939e0ac77fe6e27ec23b5158c5edb0268df86416bc2a9ab2e6a3ea251cb3df0663bbe5477a8ba42a023aeaa431e9a5bda44f99c96e6c45df27c0249853d6

    • SSDEEP

      3072:XY4qJru5yNIqE9u0va5Ei/Fd2RgLQcYqWFtD6m:XBH5yNIqx95E10QcYqWD

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks