General

  • Target

    db31610f5c10f0508c2b619c60ded2833bb388750ce0b0ab6b88b0452827fec9

  • Size

    1.2MB

  • Sample

    220605-wa4psagebk

  • MD5

    565c85a0453acfc64f84cbc70b763efc

  • SHA1

    a1e50ea1cf93a8d9922789863a60057d0629aacf

  • SHA256

    db31610f5c10f0508c2b619c60ded2833bb388750ce0b0ab6b88b0452827fec9

  • SHA512

    d9bbfbfedfeacf9c3da39069a6049ecbc69b9eb23b891c981dbec8cfc5dfb54f5ba65a3b68e71ddcf0c18cdb724779c4a94f68401bd6d655d02128012ff9d799

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      db31610f5c10f0508c2b619c60ded2833bb388750ce0b0ab6b88b0452827fec9

    • Size

      1.2MB

    • MD5

      565c85a0453acfc64f84cbc70b763efc

    • SHA1

      a1e50ea1cf93a8d9922789863a60057d0629aacf

    • SHA256

      db31610f5c10f0508c2b619c60ded2833bb388750ce0b0ab6b88b0452827fec9

    • SHA512

      d9bbfbfedfeacf9c3da39069a6049ecbc69b9eb23b891c981dbec8cfc5dfb54f5ba65a3b68e71ddcf0c18cdb724779c4a94f68401bd6d655d02128012ff9d799

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

System Information Discovery

1
T1082

Tasks