General

  • Target

    20ac8a0ae6f2c08a9f8e7827c889834cbd32059e09a0848b8bcda2b984d67124

  • Size

    1.5MB

  • Sample

    221002-tz7rmagbek

  • MD5

    08e8a0137c2b0b6d6fcc76ac2c7c1222

  • SHA1

    0836f9b9e0eee721d64d0e49e4dd4ec68d42dc8c

  • SHA256

    20ac8a0ae6f2c08a9f8e7827c889834cbd32059e09a0848b8bcda2b984d67124

  • SHA512

    52ac1bf5dcbaca564a0e120916a12bcb9d84811e664c86ce304904de6be8a3d386970460b5c803b8d9192e53083afc033b13c25f514280527711d92e842f1d56

  • SSDEEP

    24576:svehviuXbZKXJrr186amIWgVRFyIMX5xv+ZXmRE43sbjiVNcC9oJLSb+MjqPuB5n:skv7XbQsJJWgg5X5kxmRR8OND92Lu

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      20ac8a0ae6f2c08a9f8e7827c889834cbd32059e09a0848b8bcda2b984d67124

    • Size

      1.5MB

    • MD5

      08e8a0137c2b0b6d6fcc76ac2c7c1222

    • SHA1

      0836f9b9e0eee721d64d0e49e4dd4ec68d42dc8c

    • SHA256

      20ac8a0ae6f2c08a9f8e7827c889834cbd32059e09a0848b8bcda2b984d67124

    • SHA512

      52ac1bf5dcbaca564a0e120916a12bcb9d84811e664c86ce304904de6be8a3d386970460b5c803b8d9192e53083afc033b13c25f514280527711d92e842f1d56

    • SSDEEP

      24576:svehviuXbZKXJrr186amIWgVRFyIMX5xv+ZXmRE43sbjiVNcC9oJLSb+MjqPuB5n:skv7XbQsJJWgg5X5kxmRR8OND92Lu

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks