General

  • Target

    2b69ffe75232bd20321d9df470857de323f65d56917c12f205ad7f17b92d6b88N.exe

  • Size

    120KB

  • Sample

    241231-r1h4jsvlh1

  • MD5

    7bb66f52b291899b368a524515161b00

  • SHA1

    d5ff9e519f2677b8ef6697976c895f234903c497

  • SHA256

    2b69ffe75232bd20321d9df470857de323f65d56917c12f205ad7f17b92d6b88

  • SHA512

    d7c45c74ed1408bf4575e7d1d23c5ea68a69e493376aff468577ee0e8177ce627d42e28557856a7fcf85c6c8ac1ff2dfd9fe912e5234098294ffe8928d3d665d

  • SSDEEP

    1536:R1/ZY5nu2RTjfIQNbx6orpDmzL51pokxu9h7aTCFUv2rQ4str3c5E5bYLcpik6e:5wuq8Qn54HXuWuA2rDstIilp+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2b69ffe75232bd20321d9df470857de323f65d56917c12f205ad7f17b92d6b88N.exe

    • Size

      120KB

    • MD5

      7bb66f52b291899b368a524515161b00

    • SHA1

      d5ff9e519f2677b8ef6697976c895f234903c497

    • SHA256

      2b69ffe75232bd20321d9df470857de323f65d56917c12f205ad7f17b92d6b88

    • SHA512

      d7c45c74ed1408bf4575e7d1d23c5ea68a69e493376aff468577ee0e8177ce627d42e28557856a7fcf85c6c8ac1ff2dfd9fe912e5234098294ffe8928d3d665d

    • SSDEEP

      1536:R1/ZY5nu2RTjfIQNbx6orpDmzL51pokxu9h7aTCFUv2rQ4str3c5E5bYLcpik6e:5wuq8Qn54HXuWuA2rDstIilp+

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks