General

  • Target

    a72fb77b5ebdc97fde709312a839a1d8f3b4595972cfe2f3a6df50d4febb1e4e

  • Size

    975KB

  • Sample

    221003-e5wtzshdgr

  • MD5

    6201ced0ffa3bed2d3db302fcfabfc30

  • SHA1

    d51cf8e108b4b63940ef8b6ce7c6dbda76338477

  • SHA256

    a72fb77b5ebdc97fde709312a839a1d8f3b4595972cfe2f3a6df50d4febb1e4e

  • SHA512

    1bb962bfb454268c3f6bffcd37607b49aba75c8566a9220aa2aad6d91e987cc782992d2640369481baa02051cbca5f846dba609e4d7dfddc2b5559c66ba560ef

  • SSDEEP

    24576:csxWEGvLvxGW9Y5C4cpx2yuVC+u5C4cpx2yuVC+M:cAOYYKCosCo0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      a72fb77b5ebdc97fde709312a839a1d8f3b4595972cfe2f3a6df50d4febb1e4e

    • Size

      975KB

    • MD5

      6201ced0ffa3bed2d3db302fcfabfc30

    • SHA1

      d51cf8e108b4b63940ef8b6ce7c6dbda76338477

    • SHA256

      a72fb77b5ebdc97fde709312a839a1d8f3b4595972cfe2f3a6df50d4febb1e4e

    • SHA512

      1bb962bfb454268c3f6bffcd37607b49aba75c8566a9220aa2aad6d91e987cc782992d2640369481baa02051cbca5f846dba609e4d7dfddc2b5559c66ba560ef

    • SSDEEP

      24576:csxWEGvLvxGW9Y5C4cpx2yuVC+u5C4cpx2yuVC+M:cAOYYKCosCo0

    • Gozi, Gozi IFSB

      Gozi ISFB is a well-known and widely distributed banking trojan.

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks