General

  • Target

    91d82a22848e88651bf15cff44eec6dfd7499a5a87f3f03479da3175593f2aa1.exe

  • Size

    728KB

  • Sample

    241231-1hc91ssrfn

  • MD5

    17615acc5dab0c10048c280dc4e1eb40

  • SHA1

    0233019988c02bc3d74ec4d788b63d96bcb18186

  • SHA256

    91d82a22848e88651bf15cff44eec6dfd7499a5a87f3f03479da3175593f2aa1

  • SHA512

    3469e58de5c5dba820ef11300f4f4dbf7f5b18a1ffb37250f9d8279405f100d19ceefbd1b82a90e228c467beffd12c88e02f2174f47b0455179118289e699640

  • SSDEEP

    12288:wTyjXW+48qWywrU4kGFezOAVuJ5PI+ww7F5DO3HYffIVGiwraV:uIXW/8yw1ez54lIQF5SXYHIVyraV

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      91d82a22848e88651bf15cff44eec6dfd7499a5a87f3f03479da3175593f2aa1.exe

    • Size

      728KB

    • MD5

      17615acc5dab0c10048c280dc4e1eb40

    • SHA1

      0233019988c02bc3d74ec4d788b63d96bcb18186

    • SHA256

      91d82a22848e88651bf15cff44eec6dfd7499a5a87f3f03479da3175593f2aa1

    • SHA512

      3469e58de5c5dba820ef11300f4f4dbf7f5b18a1ffb37250f9d8279405f100d19ceefbd1b82a90e228c467beffd12c88e02f2174f47b0455179118289e699640

    • SSDEEP

      12288:wTyjXW+48qWywrU4kGFezOAVuJ5PI+ww7F5DO3HYffIVGiwraV:uIXW/8yw1ez54lIQF5SXYHIVyraV

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks