General

  • Target

    1939cdedcc931f7b062f2c2984c0cf338dcc42f72a49177f47e489b8ac667157

  • Size

    277KB

  • Sample

    221002-ev2mgsgee5

  • MD5

    71462259ae9966d3be28366a48bc523a

  • SHA1

    8cd9d0e8ce1241bcde672ef203bd03eff78ed305

  • SHA256

    1939cdedcc931f7b062f2c2984c0cf338dcc42f72a49177f47e489b8ac667157

  • SHA512

    82b2fd5f6a0b9409cb8e41ec66ec7b031c14f6e5e5be77e30f26670496999da0858146b08bcf6041acd3064fa918f0970f9787446a8b6b31bb21f08048274f7e

  • SSDEEP

    6144:RTO/1L8ahaI0VaSF7QTBnO501NvBMEv6480:RkF8Ap0VlQTYavqEk0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      1939cdedcc931f7b062f2c2984c0cf338dcc42f72a49177f47e489b8ac667157

    • Size

      277KB

    • MD5

      71462259ae9966d3be28366a48bc523a

    • SHA1

      8cd9d0e8ce1241bcde672ef203bd03eff78ed305

    • SHA256

      1939cdedcc931f7b062f2c2984c0cf338dcc42f72a49177f47e489b8ac667157

    • SHA512

      82b2fd5f6a0b9409cb8e41ec66ec7b031c14f6e5e5be77e30f26670496999da0858146b08bcf6041acd3064fa918f0970f9787446a8b6b31bb21f08048274f7e

    • SSDEEP

      6144:RTO/1L8ahaI0VaSF7QTBnO501NvBMEv6480:RkF8Ap0VlQTYavqEk0

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks