General

  • Target

    c8a32b2f10df86e80df4fc6ac78c88ff942d1b5f2059e506c9a7fe3b86dc6c56N.exe

  • Size

    1.2MB

  • Sample

    241231-xzkhwavmbv

  • MD5

    5197fcce49518e796e3ed4becccddd00

  • SHA1

    9a0952509dc1645449e7ed3e69d47313d5b4ed5f

  • SHA256

    c8a32b2f10df86e80df4fc6ac78c88ff942d1b5f2059e506c9a7fe3b86dc6c56

  • SHA512

    a8cca761706c9daec526955e8f752c68d825021cdf185d421f23d7bf53ffadaff42544819eb63ecb4450f858ca7a0e020a8e2974c2c2220e108585fbf4473a42

  • SSDEEP

    24576:GII2mRVMuLi/mDnICLJ4gxqBeC7/ATDNoo3cK0Ef2gsODWdR:JmRV247qBeC7/ATDNo2+Ef2gsODcR

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c8a32b2f10df86e80df4fc6ac78c88ff942d1b5f2059e506c9a7fe3b86dc6c56N.exe

    • Size

      1.2MB

    • MD5

      5197fcce49518e796e3ed4becccddd00

    • SHA1

      9a0952509dc1645449e7ed3e69d47313d5b4ed5f

    • SHA256

      c8a32b2f10df86e80df4fc6ac78c88ff942d1b5f2059e506c9a7fe3b86dc6c56

    • SHA512

      a8cca761706c9daec526955e8f752c68d825021cdf185d421f23d7bf53ffadaff42544819eb63ecb4450f858ca7a0e020a8e2974c2c2220e108585fbf4473a42

    • SSDEEP

      24576:GII2mRVMuLi/mDnICLJ4gxqBeC7/ATDNoo3cK0Ef2gsODWdR:JmRV247qBeC7/ATDNo2+Ef2gsODcR

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks