General

  • Target

    7bf709be2da5b9b5057c2784310a81eef1ba5cf971b880d53e8745ed78d4ba6e.exe

  • Size

    120KB

  • Sample

    241231-javewstrex

  • MD5

    723c9be16c2df16fb682a02d883fd723

  • SHA1

    b95c6d32470c269345ea4dafb7e469f135bb97fd

  • SHA256

    7bf709be2da5b9b5057c2784310a81eef1ba5cf971b880d53e8745ed78d4ba6e

  • SHA512

    a2e52ca03e3ff87395e4bb85061bc904cfb502fa5d2fbe23fbc6552d925d98eae352ec17fd20dff64cab251e047685e9e5c7e480cef17d291fe8cd97340e94d0

  • SSDEEP

    1536:xzo8bYt+jqCTy0u7rWNBlEIASKyDpTEwKHqwMcgEIyM56ywZC4Eh8L9KGMjnVq:x88bYtsqQaHPSdDqZgEHM56nCN8snRq

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      7bf709be2da5b9b5057c2784310a81eef1ba5cf971b880d53e8745ed78d4ba6e.exe

    • Size

      120KB

    • MD5

      723c9be16c2df16fb682a02d883fd723

    • SHA1

      b95c6d32470c269345ea4dafb7e469f135bb97fd

    • SHA256

      7bf709be2da5b9b5057c2784310a81eef1ba5cf971b880d53e8745ed78d4ba6e

    • SHA512

      a2e52ca03e3ff87395e4bb85061bc904cfb502fa5d2fbe23fbc6552d925d98eae352ec17fd20dff64cab251e047685e9e5c7e480cef17d291fe8cd97340e94d0

    • SSDEEP

      1536:xzo8bYt+jqCTy0u7rWNBlEIASKyDpTEwKHqwMcgEIyM56ywZC4Eh8L9KGMjnVq:x88bYtsqQaHPSdDqZgEHM56nCN8snRq

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks