General

  • Target

    101d92081eedfdb8eb83bca5f5a0a4f9

  • Size

    364KB

  • Sample

    220825-ye2r4aagh5

  • MD5

    101d92081eedfdb8eb83bca5f5a0a4f9

  • SHA1

    99cd4c1fe4b960aad63db3062e70d5f1e7631dc2

  • SHA256

    44e02a5fc42081cf1897661ed76899a9ffb042bacee98f398c3c687a3f7e1547

  • SHA512

    cb34e6192bbacc5ed527cba63dfd9ce165505b31f107ee41d69672191726d22487cc2ccc4d0778dc3a72a2238efcbc76f9aac6ea4d6dc428c694424614671a39

  • SSDEEP

    6144:EyH7xOc6H5c6HcT66vlml/SI01Jq3ggxDDwCkTTgPpR2tif5kv29P1xBurgI97w5:EagCkDLRkv29txErHI5

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      101d92081eedfdb8eb83bca5f5a0a4f9

    • Size

      364KB

    • MD5

      101d92081eedfdb8eb83bca5f5a0a4f9

    • SHA1

      99cd4c1fe4b960aad63db3062e70d5f1e7631dc2

    • SHA256

      44e02a5fc42081cf1897661ed76899a9ffb042bacee98f398c3c687a3f7e1547

    • SHA512

      cb34e6192bbacc5ed527cba63dfd9ce165505b31f107ee41d69672191726d22487cc2ccc4d0778dc3a72a2238efcbc76f9aac6ea4d6dc428c694424614671a39

    • SSDEEP

      6144:EyH7xOc6H5c6HcT66vlml/SI01Jq3ggxDDwCkTTgPpR2tif5kv29P1xBurgI97w5:EagCkDLRkv29txErHI5

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

System Information Discovery

1
T1082

Tasks