General

  • Target

    a640696a29c57a9307f03a46f474e1ced4aecabfb0ec65e0ad5164334e08c7cf

  • Size

    337KB

  • Sample

    221002-enkqdshedk

  • MD5

    6c496ea8e046992cdd9c01e69cc22703

  • SHA1

    b97aa6cd85fe7012a92330802b9f4e2d1376e2f2

  • SHA256

    a640696a29c57a9307f03a46f474e1ced4aecabfb0ec65e0ad5164334e08c7cf

  • SHA512

    05fa2559af16ff851548e0285dc55d918aca0d21f8b9855f29ab07088fd68fb55a71cb02301ca9b8d055ea8776f024327eefe09fd3371be91e79aea6cae6b4c7

  • SSDEEP

    6144:hMY94NoNM4yg5vf2DeSUDPeAeD5jxtQk8IdryXCWvl:N9Ovq50hUL0xtpDdrySWvl

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      a640696a29c57a9307f03a46f474e1ced4aecabfb0ec65e0ad5164334e08c7cf

    • Size

      337KB

    • MD5

      6c496ea8e046992cdd9c01e69cc22703

    • SHA1

      b97aa6cd85fe7012a92330802b9f4e2d1376e2f2

    • SHA256

      a640696a29c57a9307f03a46f474e1ced4aecabfb0ec65e0ad5164334e08c7cf

    • SHA512

      05fa2559af16ff851548e0285dc55d918aca0d21f8b9855f29ab07088fd68fb55a71cb02301ca9b8d055ea8776f024327eefe09fd3371be91e79aea6cae6b4c7

    • SSDEEP

      6144:hMY94NoNM4yg5vf2DeSUDPeAeD5jxtQk8IdryXCWvl:N9Ovq50hUL0xtpDdrySWvl

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks