General

  • Target

    646814c459b74e21239e3f7695f5d045d89f50adc0a942ed657094c5d8cf18d3N.exe

  • Size

    120KB

  • Sample

    241231-rmf22awphm

  • MD5

    8b41a85213e539ea9e329878f1209db0

  • SHA1

    0e575edcc848c253814b12296a7d5e53dd26aeb6

  • SHA256

    646814c459b74e21239e3f7695f5d045d89f50adc0a942ed657094c5d8cf18d3

  • SHA512

    efac2d637acd285f368434983ccff61ba438499985d8aa691f4ae7f868a82b05ce8f3323fa79e54ef43b0f310d2b518031d96861af65928aa389fe0ea4b2c497

  • SSDEEP

    1536:XUXZkf5smZJWRc/5gFqxxRTVEPViATRQMtbuNQIgaNVWgxmXPAXpwCNS6Cn:Epkf5KhsxxRJE9RQ5G3qx3nr

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      646814c459b74e21239e3f7695f5d045d89f50adc0a942ed657094c5d8cf18d3N.exe

    • Size

      120KB

    • MD5

      8b41a85213e539ea9e329878f1209db0

    • SHA1

      0e575edcc848c253814b12296a7d5e53dd26aeb6

    • SHA256

      646814c459b74e21239e3f7695f5d045d89f50adc0a942ed657094c5d8cf18d3

    • SHA512

      efac2d637acd285f368434983ccff61ba438499985d8aa691f4ae7f868a82b05ce8f3323fa79e54ef43b0f310d2b518031d96861af65928aa389fe0ea4b2c497

    • SSDEEP

      1536:XUXZkf5smZJWRc/5gFqxxRTVEPViATRQMtbuNQIgaNVWgxmXPAXpwCNS6Cn:Epkf5KhsxxRJE9RQ5G3qx3nr

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks