General

  • Target

    925595a0b9f81fcc861018ddabe647e88030d4c595c6a01d86dabd847d0e9d23

  • Size

    488KB

  • Sample

    220605-v36t6sgdgq

  • MD5

    9f92d533777a4909eb4f3d201e742bbb

  • SHA1

    532712e939f2892a1aa1c383b1d47ef96dab2072

  • SHA256

    925595a0b9f81fcc861018ddabe647e88030d4c595c6a01d86dabd847d0e9d23

  • SHA512

    699f6d902f6c9e62ed07394fa5299dbe6c8369ddd568ba5e35c1a806dd32279e3c6837c241b37d53356492570966fdfd0187b1a716f4ac65a346ef2e2f9a21e4

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      925595a0b9f81fcc861018ddabe647e88030d4c595c6a01d86dabd847d0e9d23

    • Size

      488KB

    • MD5

      9f92d533777a4909eb4f3d201e742bbb

    • SHA1

      532712e939f2892a1aa1c383b1d47ef96dab2072

    • SHA256

      925595a0b9f81fcc861018ddabe647e88030d4c595c6a01d86dabd847d0e9d23

    • SHA512

      699f6d902f6c9e62ed07394fa5299dbe6c8369ddd568ba5e35c1a806dd32279e3c6837c241b37d53356492570966fdfd0187b1a716f4ac65a346ef2e2f9a21e4

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

System Information Discovery

1
T1082

Tasks