General

  • Target

    solaris (4).exe

  • Size

    96KB

  • Sample

    250101-fgrqssxpgk

  • MD5

    272fa9a22a31e40c9edbdf44232dc229

  • SHA1

    b2a28298762bc5e8bcea52cde3d653b3d2b772b8

  • SHA256

    32ebef7e02c3f52e6a0776ea1942d35155670f59d334a65beaac4fc964966030

  • SHA512

    357eb0a5456f633add5ecac7d4cf56bda624fb8781a32a4b59f6ed980d0604d5115c33c07ef796225b37028f680106798a12ba4f7aecac02c2fbe31219c8dcc8

  • SSDEEP

    1536:/vSh8E9DItCBr3KW+zTEKZ0Nnljs57Q5/+VYV25GpN/6CyHA+Jn/+h1i:Y9U3IhpOi65y/SA+NC1i

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      solaris (4).exe

    • Size

      96KB

    • MD5

      272fa9a22a31e40c9edbdf44232dc229

    • SHA1

      b2a28298762bc5e8bcea52cde3d653b3d2b772b8

    • SHA256

      32ebef7e02c3f52e6a0776ea1942d35155670f59d334a65beaac4fc964966030

    • SHA512

      357eb0a5456f633add5ecac7d4cf56bda624fb8781a32a4b59f6ed980d0604d5115c33c07ef796225b37028f680106798a12ba4f7aecac02c2fbe31219c8dcc8

    • SSDEEP

      1536:/vSh8E9DItCBr3KW+zTEKZ0Nnljs57Q5/+VYV25GpN/6CyHA+Jn/+h1i:Y9U3IhpOi65y/SA+NC1i

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks