General

  • Target

    1155291200d896b9090b6fa4b3b483c6

  • Size

    360KB

  • Sample

    220825-y5c7esbch9

  • MD5

    1155291200d896b9090b6fa4b3b483c6

  • SHA1

    66948571a3e7620a70e0b5107e6b612319b9c0c6

  • SHA256

    69ca8fd3777edfad58abd94fd1a5998636fcf2a8f4eee893e6b9a4b691827059

  • SHA512

    9f58acb6abc26d3d44ee7b4c55673200f2d6e5ea68df892c54f538a9030b6a8a5e12c63a7b67865c648a5da1336df688076aecfec165ce6b12403b1590f1a0a4

  • SSDEEP

    6144:EyH7xOc6H5c6HcT66vlml/SI01Jq3ggxDDwCkTTgPQRAmRf5kirNbiweCBurgIUU:EagCkDaBRkirNVeCEr6I5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1155291200d896b9090b6fa4b3b483c6

    • Size

      360KB

    • MD5

      1155291200d896b9090b6fa4b3b483c6

    • SHA1

      66948571a3e7620a70e0b5107e6b612319b9c0c6

    • SHA256

      69ca8fd3777edfad58abd94fd1a5998636fcf2a8f4eee893e6b9a4b691827059

    • SHA512

      9f58acb6abc26d3d44ee7b4c55673200f2d6e5ea68df892c54f538a9030b6a8a5e12c63a7b67865c648a5da1336df688076aecfec165ce6b12403b1590f1a0a4

    • SSDEEP

      6144:EyH7xOc6H5c6HcT66vlml/SI01Jq3ggxDDwCkTTgPQRAmRf5kirNbiweCBurgIUU:EagCkDaBRkirNVeCEr6I5

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

System Information Discovery

1
T1082

Tasks