General

  • Target

    938d0b367d1ce043cf42f420921c1669fc913efd5c835e78c63cbb9aa1cd8d04

  • Size

    368KB

  • Sample

    221002-epjvgshefn

  • MD5

    632f78d7ad89e50e0e0b8e39dfcd90f6

  • SHA1

    8706d40af6114a81730a20946fbd3030109feb80

  • SHA256

    938d0b367d1ce043cf42f420921c1669fc913efd5c835e78c63cbb9aa1cd8d04

  • SHA512

    b91d85aef3cf0076af9404637a4f71914b03a67a214ecdeaabae5abbe7ae6f2ca9171d5a3b66bc3dcd1c6973c66beaf403a1095d55bfbf260faa312e6869c0ec

  • SSDEEP

    6144:qL3Si2xLwgxYv/srWpAVs5uPD6h9LPjcsH9rXaNCVPyN/TO9a:vxLVMsCpn5K6hZLdrXcKW/2a

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      938d0b367d1ce043cf42f420921c1669fc913efd5c835e78c63cbb9aa1cd8d04

    • Size

      368KB

    • MD5

      632f78d7ad89e50e0e0b8e39dfcd90f6

    • SHA1

      8706d40af6114a81730a20946fbd3030109feb80

    • SHA256

      938d0b367d1ce043cf42f420921c1669fc913efd5c835e78c63cbb9aa1cd8d04

    • SHA512

      b91d85aef3cf0076af9404637a4f71914b03a67a214ecdeaabae5abbe7ae6f2ca9171d5a3b66bc3dcd1c6973c66beaf403a1095d55bfbf260faa312e6869c0ec

    • SSDEEP

      6144:qL3Si2xLwgxYv/srWpAVs5uPD6h9LPjcsH9rXaNCVPyN/TO9a:vxLVMsCpn5K6hZLdrXcKW/2a

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks