General

  • Target

    2932b77e08e4bedbd61c34b581d69b48

  • Size

    368KB

  • Sample

    220825-y261bsadgq

  • MD5

    2932b77e08e4bedbd61c34b581d69b48

  • SHA1

    e5e9be17066875a1906892d14148d88bd3c9a019

  • SHA256

    3c172f4a0a21bd8ad1fabd66548cd3fffa21e8515809b7f16d6d9d23b50ba9ef

  • SHA512

    a5ec49a09bc97f579747f859f9feb8c5ebf1b4e7b240d2cd62c3a4e919d74e5f331b3a42420868924cf9ddef180e8406c5c01910da9be23e75133d06296e18a5

  • SSDEEP

    6144:EyH7xOc6H5c6HcT66vlml/SI01Jq3ggxDDwCkTTgPyMQqBIf5k+zwd8O3XH/Bura:EagCkDTBIRk1CcvErlI5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      2932b77e08e4bedbd61c34b581d69b48

    • Size

      368KB

    • MD5

      2932b77e08e4bedbd61c34b581d69b48

    • SHA1

      e5e9be17066875a1906892d14148d88bd3c9a019

    • SHA256

      3c172f4a0a21bd8ad1fabd66548cd3fffa21e8515809b7f16d6d9d23b50ba9ef

    • SHA512

      a5ec49a09bc97f579747f859f9feb8c5ebf1b4e7b240d2cd62c3a4e919d74e5f331b3a42420868924cf9ddef180e8406c5c01910da9be23e75133d06296e18a5

    • SSDEEP

      6144:EyH7xOc6H5c6HcT66vlml/SI01Jq3ggxDDwCkTTgPyMQqBIf5k+zwd8O3XH/Bura:EagCkDTBIRk1CcvErlI5

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

System Information Discovery

1
T1082

Tasks