General

  • Target

    d4e71fd09201811bfc10f5bad727d359f85796902ef65263c5324f73bb56ca1e.exe

  • Size

    120KB

  • Sample

    241231-wn94qaskft

  • MD5

    1834bcbef9e5ed544c51b09047cdd764

  • SHA1

    74fa293179a17105187b90d95d1ccaa59947adca

  • SHA256

    d4e71fd09201811bfc10f5bad727d359f85796902ef65263c5324f73bb56ca1e

  • SHA512

    8c415a6293bcbbd846095cb58f5de4d3cc1add63ec8dbe21680ca81f8beadd42f0ad9e5efea23258b962f3b877e6ce2171a0de49a8464fadb13d178c3adcce28

  • SSDEEP

    3072:5qxOMupR5NCza/6rg7imqZDg4fIOdm0zYgM82:tMuv5kVE7iPZDxfG0g82

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      d4e71fd09201811bfc10f5bad727d359f85796902ef65263c5324f73bb56ca1e.exe

    • Size

      120KB

    • MD5

      1834bcbef9e5ed544c51b09047cdd764

    • SHA1

      74fa293179a17105187b90d95d1ccaa59947adca

    • SHA256

      d4e71fd09201811bfc10f5bad727d359f85796902ef65263c5324f73bb56ca1e

    • SHA512

      8c415a6293bcbbd846095cb58f5de4d3cc1add63ec8dbe21680ca81f8beadd42f0ad9e5efea23258b962f3b877e6ce2171a0de49a8464fadb13d178c3adcce28

    • SSDEEP

      3072:5qxOMupR5NCza/6rg7imqZDg4fIOdm0zYgM82:tMuv5kVE7iPZDxfG0g82

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks