General

  • Target

    0256ef78806db7e1eb96ec25585188fc25105a054174542d5fd98bec82047885

  • Size

    65KB

  • Sample

    221002-1ssgpaccg9

  • MD5

    7010d62b960793f7b80211b2fc269840

  • SHA1

    9af0f7508fb571e308fcdfe1de27512d749690ba

  • SHA256

    0256ef78806db7e1eb96ec25585188fc25105a054174542d5fd98bec82047885

  • SHA512

    feff92bdf23fb96ec8d116e482eba55a84622ae72c91273e7b969af51877d37bdabe55c210547a991217c55392239a831ef7cd863e48c117ceeb3f8f45b74590

  • SSDEEP

    1536:s8FDZcxocpQGEKmjVNxPFPY2LN2REDL1jGrQoV0c9hXG6VR:sKZchVEKQvtPFd1SkI33J

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0256ef78806db7e1eb96ec25585188fc25105a054174542d5fd98bec82047885

    • Size

      65KB

    • MD5

      7010d62b960793f7b80211b2fc269840

    • SHA1

      9af0f7508fb571e308fcdfe1de27512d749690ba

    • SHA256

      0256ef78806db7e1eb96ec25585188fc25105a054174542d5fd98bec82047885

    • SHA512

      feff92bdf23fb96ec8d116e482eba55a84622ae72c91273e7b969af51877d37bdabe55c210547a991217c55392239a831ef7cd863e48c117ceeb3f8f45b74590

    • SSDEEP

      1536:s8FDZcxocpQGEKmjVNxPFPY2LN2REDL1jGrQoV0c9hXG6VR:sKZchVEKQvtPFd1SkI33J

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks