General

  • Target

    5168f3dc09e91493f1f125b3f3b6165bb0f270bc577525aecdf7a4c4b4c11466

  • Size

    148KB

  • Sample

    221003-w3abmsagcl

  • MD5

    2d6945cb8d9ba0653635f51f9ede83c0

  • SHA1

    033d9efede8071e177c8de14058f79e1f2a30959

  • SHA256

    5168f3dc09e91493f1f125b3f3b6165bb0f270bc577525aecdf7a4c4b4c11466

  • SHA512

    c99a355d85bc5cdc7614d6e0aaf04616043be006c7feac5c2aec8cc1eb0977476e77d5cd84b4854b9c1aeb41fdce7743456a9790b3ced0e17b3ab7a24f5e7096

  • SSDEEP

    3072:wZk0QpFZyOSAYZRx6iDrhfMUpQQ2oDPObX9PoSkG+vOXHPxDUKVK:wZk0lrp3qX9QSv4Cs

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      5168f3dc09e91493f1f125b3f3b6165bb0f270bc577525aecdf7a4c4b4c11466

    • Size

      148KB

    • MD5

      2d6945cb8d9ba0653635f51f9ede83c0

    • SHA1

      033d9efede8071e177c8de14058f79e1f2a30959

    • SHA256

      5168f3dc09e91493f1f125b3f3b6165bb0f270bc577525aecdf7a4c4b4c11466

    • SHA512

      c99a355d85bc5cdc7614d6e0aaf04616043be006c7feac5c2aec8cc1eb0977476e77d5cd84b4854b9c1aeb41fdce7743456a9790b3ced0e17b3ab7a24f5e7096

    • SSDEEP

      3072:wZk0QpFZyOSAYZRx6iDrhfMUpQQ2oDPObX9PoSkG+vOXHPxDUKVK:wZk0lrp3qX9QSv4Cs

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks