General

  • Target

    f9d76688b45a05c9210393cfd48a4c65981591177b64c7b921e267551c1e7b66N.exe

  • Size

    128KB

  • Sample

    241231-xjjxeatnez

  • MD5

    7aa1a3c26b81c67bcd15e6453d7e9ed0

  • SHA1

    facec43ee5eccac060fdd434c7f1530621eb2f7e

  • SHA256

    f9d76688b45a05c9210393cfd48a4c65981591177b64c7b921e267551c1e7b66

  • SHA512

    d6e025886b43d5d203aa51d19bd20fc127d43bc7c35018639c9eaed47daeb26f360e6f51b8778b2c8ddd23754dcaea4a67b8cfc0c0152c81599281c0eaa1e8b4

  • SSDEEP

    1536:1Jf83W8W60IL26Ap8iJ9+pvI8B8FuuKk1p0AxQjKP3xNL+vljZuIkBbmFZ3Oz+Ua:1JCD548iJK+cDm0KNxkllFFxOFdc

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      f9d76688b45a05c9210393cfd48a4c65981591177b64c7b921e267551c1e7b66N.exe

    • Size

      128KB

    • MD5

      7aa1a3c26b81c67bcd15e6453d7e9ed0

    • SHA1

      facec43ee5eccac060fdd434c7f1530621eb2f7e

    • SHA256

      f9d76688b45a05c9210393cfd48a4c65981591177b64c7b921e267551c1e7b66

    • SHA512

      d6e025886b43d5d203aa51d19bd20fc127d43bc7c35018639c9eaed47daeb26f360e6f51b8778b2c8ddd23754dcaea4a67b8cfc0c0152c81599281c0eaa1e8b4

    • SSDEEP

      1536:1Jf83W8W60IL26Ap8iJ9+pvI8B8FuuKk1p0AxQjKP3xNL+vljZuIkBbmFZ3Oz+Ua:1JCD548iJK+cDm0KNxkllFFxOFdc

    • Modifies WinLogon for persistence

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks