General

  • Target

    0ea3d28ec8ebac0202665f5f2fda18f7767358b91b57aacfad502e9a02bdc911

  • Size

    384KB

  • Sample

    221002-ewhk1ahgfl

  • MD5

    55d2926c2e64bcb690d6249e879a46ff

  • SHA1

    1809b6dc3e82258a2babd59b3066526f464c6446

  • SHA256

    0ea3d28ec8ebac0202665f5f2fda18f7767358b91b57aacfad502e9a02bdc911

  • SHA512

    d147ee99619e8033534a01c5db6bfab1bc27cac12d5f6f9523697b64c1165dbb90f5a60b7161afbce025025208b170def81b0638f46bc2449f3d3e8a06808516

  • SSDEEP

    12288:WdQR5/ngub3bLlb8JgVaA8dZzfpnEhKt+1bK7:qQDFb3bL+6VaA8dZ9Ehtb+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      0ea3d28ec8ebac0202665f5f2fda18f7767358b91b57aacfad502e9a02bdc911

    • Size

      384KB

    • MD5

      55d2926c2e64bcb690d6249e879a46ff

    • SHA1

      1809b6dc3e82258a2babd59b3066526f464c6446

    • SHA256

      0ea3d28ec8ebac0202665f5f2fda18f7767358b91b57aacfad502e9a02bdc911

    • SHA512

      d147ee99619e8033534a01c5db6bfab1bc27cac12d5f6f9523697b64c1165dbb90f5a60b7161afbce025025208b170def81b0638f46bc2449f3d3e8a06808516

    • SSDEEP

      12288:WdQR5/ngub3bLlb8JgVaA8dZzfpnEhKt+1bK7:qQDFb3bL+6VaA8dZ9Ehtb+

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks