General

  • Target

    50e13ac64cfe51956b5c15465796c4f645e79750cbe6f36a6e7aead598fc5b68

  • Size

    744KB

  • Sample

    221002-vc4bcsfcb7

  • MD5

    67b784ee5cb57165d840535fd132dac8

  • SHA1

    1c25cafbeb127ca4ca0537ec04493c1991bf8db9

  • SHA256

    50e13ac64cfe51956b5c15465796c4f645e79750cbe6f36a6e7aead598fc5b68

  • SHA512

    298ff56144abfc84ed220274f5c76bd8f0384d5052fc0dd932ac6d14dc838677d96dfcdf39c9b2ddb5d9edcc51dbe9beffb97c6e6934a85e7fc8c88523682f0b

  • SSDEEP

    12288:NTyjXW+48qWywrU4kGFezOAVuJ5PIcww7F5DO3HYffB3NItGKa:RIXW/8yw1ez54lI6F5SXYHBdxd

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      50e13ac64cfe51956b5c15465796c4f645e79750cbe6f36a6e7aead598fc5b68

    • Size

      744KB

    • MD5

      67b784ee5cb57165d840535fd132dac8

    • SHA1

      1c25cafbeb127ca4ca0537ec04493c1991bf8db9

    • SHA256

      50e13ac64cfe51956b5c15465796c4f645e79750cbe6f36a6e7aead598fc5b68

    • SHA512

      298ff56144abfc84ed220274f5c76bd8f0384d5052fc0dd932ac6d14dc838677d96dfcdf39c9b2ddb5d9edcc51dbe9beffb97c6e6934a85e7fc8c88523682f0b

    • SSDEEP

      12288:NTyjXW+48qWywrU4kGFezOAVuJ5PIcww7F5DO3HYffB3NItGKa:RIXW/8yw1ez54lI6F5SXYHBdxd

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks