General

  • Target

    3987740353f869e7712f8d6b1cf12ee4

  • Size

    170KB

  • Sample

    220920-vlh2sahefn

  • MD5

    3987740353f869e7712f8d6b1cf12ee4

  • SHA1

    b83fdcf3c7deb4c9d5ed6b0090fbde618c4a1957

  • SHA256

    9e77e732d22a4ea52a9c1a4526deb4627573a5f5266287ba20a0ec7f6cba6d0b

  • SHA512

    45bd9ecf09cf9ab557cfb0c3ff6e499acf2547fcbe7477f9ba3a4b752c049a2caa0ca2c3e94926bfb01f4b811957172872220c75f2ffeb9cb4ec46376659b09c

  • SSDEEP

    3072:CyH99g4byc6H5c6HcT66vlmm+Yz0pTMCRQ777280wHI3JiM2EbXW+ooQnMya:CyH7xOc6H5c6HcT66vlmUz0RMogmtwH2

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      3987740353f869e7712f8d6b1cf12ee4

    • Size

      170KB

    • MD5

      3987740353f869e7712f8d6b1cf12ee4

    • SHA1

      b83fdcf3c7deb4c9d5ed6b0090fbde618c4a1957

    • SHA256

      9e77e732d22a4ea52a9c1a4526deb4627573a5f5266287ba20a0ec7f6cba6d0b

    • SHA512

      45bd9ecf09cf9ab557cfb0c3ff6e499acf2547fcbe7477f9ba3a4b752c049a2caa0ca2c3e94926bfb01f4b811957172872220c75f2ffeb9cb4ec46376659b09c

    • SSDEEP

      3072:CyH99g4byc6H5c6HcT66vlmm+Yz0pTMCRQ777280wHI3JiM2EbXW+ooQnMya:CyH7xOc6H5c6HcT66vlmUz0RMogmtwH2

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks