General

  • Target

    44bc148a3016cb50f52deb8a8ed0e0ee4d8e26ff97c2235c4906a1cd73333ebf

  • Size

    900KB

  • Sample

    221002-essxkagdg2

  • MD5

    665bcd41ad95dbbff5e742951b15aac0

  • SHA1

    dafe6e95c1587cf48486d67a2983c8fa9143adaf

  • SHA256

    44bc148a3016cb50f52deb8a8ed0e0ee4d8e26ff97c2235c4906a1cd73333ebf

  • SHA512

    322695e803c59061853a408893626abe097495dda87837664eb471ec937a4fd890c767b05da45f2ba77faa74b487d59feaf6669a8c6f3743bed4db6a3006851d

  • SSDEEP

    24576:YfEpmmY0Vm+0efFDYN9raDpnfdP0aw4CivO/Vg:YfmbVVm+vsNNaFfmawe

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      44bc148a3016cb50f52deb8a8ed0e0ee4d8e26ff97c2235c4906a1cd73333ebf

    • Size

      900KB

    • MD5

      665bcd41ad95dbbff5e742951b15aac0

    • SHA1

      dafe6e95c1587cf48486d67a2983c8fa9143adaf

    • SHA256

      44bc148a3016cb50f52deb8a8ed0e0ee4d8e26ff97c2235c4906a1cd73333ebf

    • SHA512

      322695e803c59061853a408893626abe097495dda87837664eb471ec937a4fd890c767b05da45f2ba77faa74b487d59feaf6669a8c6f3743bed4db6a3006851d

    • SSDEEP

      24576:YfEpmmY0Vm+0efFDYN9raDpnfdP0aw4CivO/Vg:YfmbVVm+vsNNaFfmawe

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks