General

  • Target

    885f3a9a5284cb664584ca7439bd3aab62fdb10149f1ae3de90a88671170140b.exe

  • Size

    120KB

  • Sample

    241231-hpk94azldl

  • MD5

    a17e403f4d41f01c3f3ec9825a5673d5

  • SHA1

    622ddb0ed42a35968b9abc3c867c59eceaaefa47

  • SHA256

    885f3a9a5284cb664584ca7439bd3aab62fdb10149f1ae3de90a88671170140b

  • SHA512

    42a6e96ec10a84a7ba841b575a4b5103cc1e7dc4f051ee8061b54ac9eca266d007d8f8878186be6865bc07082836134574e36702c20d62073da7a641ff890949

  • SSDEEP

    1536:XUXZkf5smZJWRc/5gFqxxRTVEPViATRQMtbuNQIgaNVWgxmXPAXpwCNS6CnR:Epkf5KhsxxRJE9RQ5G3qx3nre

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      885f3a9a5284cb664584ca7439bd3aab62fdb10149f1ae3de90a88671170140b.exe

    • Size

      120KB

    • MD5

      a17e403f4d41f01c3f3ec9825a5673d5

    • SHA1

      622ddb0ed42a35968b9abc3c867c59eceaaefa47

    • SHA256

      885f3a9a5284cb664584ca7439bd3aab62fdb10149f1ae3de90a88671170140b

    • SHA512

      42a6e96ec10a84a7ba841b575a4b5103cc1e7dc4f051ee8061b54ac9eca266d007d8f8878186be6865bc07082836134574e36702c20d62073da7a641ff890949

    • SSDEEP

      1536:XUXZkf5smZJWRc/5gFqxxRTVEPViATRQMtbuNQIgaNVWgxmXPAXpwCNS6CnR:Epkf5KhsxxRJE9RQ5G3qx3nre

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks