General

  • Target

    c1de06d8cfaedc5a4ed5a1e8b1e4c1fe504e4a227ea3f055c60b3aeded12a3e6

  • Size

    106KB

  • Sample

    220720-yja5yahgaj

  • MD5

    4dc5009dd4f137a041e05334b281d4fc

  • SHA1

    abf507424513bd78867e09bc06d2636f9fe051af

  • SHA256

    c1de06d8cfaedc5a4ed5a1e8b1e4c1fe504e4a227ea3f055c60b3aeded12a3e6

  • SHA512

    0dddf30f61bc62ae387954f8f94ce647a787e3b3cc468238ba2cdf751f201e113028fcf7d88c39a8e8837066a19c8fd5219b3a57f3422edd20eca6d4c90d618d

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      c1de06d8cfaedc5a4ed5a1e8b1e4c1fe504e4a227ea3f055c60b3aeded12a3e6

    • Size

      106KB

    • MD5

      4dc5009dd4f137a041e05334b281d4fc

    • SHA1

      abf507424513bd78867e09bc06d2636f9fe051af

    • SHA256

      c1de06d8cfaedc5a4ed5a1e8b1e4c1fe504e4a227ea3f055c60b3aeded12a3e6

    • SHA512

      0dddf30f61bc62ae387954f8f94ce647a787e3b3cc468238ba2cdf751f201e113028fcf7d88c39a8e8837066a19c8fd5219b3a57f3422edd20eca6d4c90d618d

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

System Information Discovery

2
T1082

Tasks