General

  • Target

    d7c387f3c4014baa00ec1a5be0dfae69ed4c4dab40ec25e7809b8c709867de83

  • Size

    421KB

  • Sample

    221003-etwd3sffc5

  • MD5

    620209396996637e9e0263773a6ecae0

  • SHA1

    10d1932fe70e47dce0a316745e551a9a0d2a231f

  • SHA256

    d7c387f3c4014baa00ec1a5be0dfae69ed4c4dab40ec25e7809b8c709867de83

  • SHA512

    d3b6510cff97b2988a6e616780e0a815ac5c930a04f99b3d802570f8b52413adfa9cf93b43ca428b52e625be02eb95aac4fa44c1c462984b96046e5b29dfa31a

  • SSDEEP

    6144:BWb6GdYJGY1CLKd6Gr5sZH8XL7k19X0eTLE9AIHR1y9X9S+mPLmpj:BWbvhLq6y8H8X3k1liakL6j

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      d7c387f3c4014baa00ec1a5be0dfae69ed4c4dab40ec25e7809b8c709867de83

    • Size

      421KB

    • MD5

      620209396996637e9e0263773a6ecae0

    • SHA1

      10d1932fe70e47dce0a316745e551a9a0d2a231f

    • SHA256

      d7c387f3c4014baa00ec1a5be0dfae69ed4c4dab40ec25e7809b8c709867de83

    • SHA512

      d3b6510cff97b2988a6e616780e0a815ac5c930a04f99b3d802570f8b52413adfa9cf93b43ca428b52e625be02eb95aac4fa44c1c462984b96046e5b29dfa31a

    • SSDEEP

      6144:BWb6GdYJGY1CLKd6Gr5sZH8XL7k19X0eTLE9AIHR1y9X9S+mPLmpj:BWbvhLq6y8H8X3k1liakL6j

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks