General

  • Target

    bb7042f42ea789b69a5c116079bcbc9413279c6b2924ea36f246285dfa212dbdN.exe

  • Size

    384KB

  • Sample

    241231-bb1z3awpbq

  • MD5

    49dfb5e4b33c5ee80886f6fe610769f0

  • SHA1

    3dcc2e45fca701dd141ae58bb8916704cbfc0439

  • SHA256

    bb7042f42ea789b69a5c116079bcbc9413279c6b2924ea36f246285dfa212dbd

  • SHA512

    3a4a9b1b0c1be1e3ee9b2cc3e767223a2cd57a3a3d0ccef39f6f246d5fdd16bcc3eb9df63310137f9a53d5ce1069f9e8872bd4c6aa9a890c19684c45ac54a735

  • SSDEEP

    12288:h20VlhganzrWSG6zCWC5kcDeltmxasBorLSJiI/Tm+rm:llzriWWDeuxaprLSnTo

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      bb7042f42ea789b69a5c116079bcbc9413279c6b2924ea36f246285dfa212dbdN.exe

    • Size

      384KB

    • MD5

      49dfb5e4b33c5ee80886f6fe610769f0

    • SHA1

      3dcc2e45fca701dd141ae58bb8916704cbfc0439

    • SHA256

      bb7042f42ea789b69a5c116079bcbc9413279c6b2924ea36f246285dfa212dbd

    • SHA512

      3a4a9b1b0c1be1e3ee9b2cc3e767223a2cd57a3a3d0ccef39f6f246d5fdd16bcc3eb9df63310137f9a53d5ce1069f9e8872bd4c6aa9a890c19684c45ac54a735

    • SSDEEP

      12288:h20VlhganzrWSG6zCWC5kcDeltmxasBorLSJiI/Tm+rm:llzriWWDeuxaprLSnTo

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks