General

  • Target

    50d8d67354521ae0e48ef57b29dba5eeeefe013ef8cd7f9f9f22256a83832d71.exe

  • Size

    120KB

  • Sample

    241231-smrn7swmdy

  • MD5

    464ee14a56717a4abfe059ce9796dd52

  • SHA1

    79a38da1c205ad0b2a359e82cd90b2930f5004be

  • SHA256

    50d8d67354521ae0e48ef57b29dba5eeeefe013ef8cd7f9f9f22256a83832d71

  • SHA512

    cfd5c44934f41b6f3f449957c33eec032d5e5d95de55d239feef261176b2ad25dfadf9b4a50b9f1332317848ba28254f6fa607e8ad2e857cdad21fe46cb423e2

  • SSDEEP

    3072:U39Gtlvc5dTdenw8R3iPoeeOi97lsDgbOzw6el:Qulvc5mF4rHriX6el

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      50d8d67354521ae0e48ef57b29dba5eeeefe013ef8cd7f9f9f22256a83832d71.exe

    • Size

      120KB

    • MD5

      464ee14a56717a4abfe059ce9796dd52

    • SHA1

      79a38da1c205ad0b2a359e82cd90b2930f5004be

    • SHA256

      50d8d67354521ae0e48ef57b29dba5eeeefe013ef8cd7f9f9f22256a83832d71

    • SHA512

      cfd5c44934f41b6f3f449957c33eec032d5e5d95de55d239feef261176b2ad25dfadf9b4a50b9f1332317848ba28254f6fa607e8ad2e857cdad21fe46cb423e2

    • SSDEEP

      3072:U39Gtlvc5dTdenw8R3iPoeeOi97lsDgbOzw6el:Qulvc5mF4rHriX6el

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks