General

  • Target

    24405fb022d37ec416eb77b8049958f2fe323e17d0a262d7d4826124bd016e3c

  • Size

    140KB

  • Sample

    221002-x56y3affa5

  • MD5

    3d7f5b84e63a3c10d6b50f6ab7aba446

  • SHA1

    b42f20a2914868120c30ac7ee2e0f9edac381e9d

  • SHA256

    24405fb022d37ec416eb77b8049958f2fe323e17d0a262d7d4826124bd016e3c

  • SHA512

    f875e49bf2dd672df2484513847b70810c7b8bc9a6ec9e0a705576984bf8f3f9a4c079d10d937b062d803f47d79ccf84d7bcf89b7af85148ddf3f2dfaae5f250

  • SSDEEP

    3072:Puug15q6gVLypcUwA+7vIQV4DZvfc8ELxXwm8ATlpeTEJ:Pu5gVLyo7vIQCvf7EdgJE

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      24405fb022d37ec416eb77b8049958f2fe323e17d0a262d7d4826124bd016e3c

    • Size

      140KB

    • MD5

      3d7f5b84e63a3c10d6b50f6ab7aba446

    • SHA1

      b42f20a2914868120c30ac7ee2e0f9edac381e9d

    • SHA256

      24405fb022d37ec416eb77b8049958f2fe323e17d0a262d7d4826124bd016e3c

    • SHA512

      f875e49bf2dd672df2484513847b70810c7b8bc9a6ec9e0a705576984bf8f3f9a4c079d10d937b062d803f47d79ccf84d7bcf89b7af85148ddf3f2dfaae5f250

    • SSDEEP

      3072:Puug15q6gVLypcUwA+7vIQV4DZvfc8ELxXwm8ATlpeTEJ:Pu5gVLyo7vIQCvf7EdgJE

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks