General

  • Target

    29ff7f2dc5e08679845d5a4e1b848c121b80cdad8e4bd6a1fcd05cda94ffe465

  • Size

    164KB

  • Sample

    221003-w53qzaahdl

  • MD5

    2f2f7053df2ca26864721f03caef0980

  • SHA1

    7e678fd598286fd9043be72ad261078b7f4e8db0

  • SHA256

    29ff7f2dc5e08679845d5a4e1b848c121b80cdad8e4bd6a1fcd05cda94ffe465

  • SHA512

    260729378ea715a9e755827f6bdb030b0bd7c55767c0de1dd0b9b5b95ee737fe226a0762a13ad2d38a4a90a593f7efa7c969c5c020718af9b4223069d0b88812

  • SSDEEP

    3072:dNQKPWDyUI0iJltZrpRXyy4mcQkmqJtNkIkQJN++2CYpHnOE:dNSDyUItthp9bcQkFki++

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      29ff7f2dc5e08679845d5a4e1b848c121b80cdad8e4bd6a1fcd05cda94ffe465

    • Size

      164KB

    • MD5

      2f2f7053df2ca26864721f03caef0980

    • SHA1

      7e678fd598286fd9043be72ad261078b7f4e8db0

    • SHA256

      29ff7f2dc5e08679845d5a4e1b848c121b80cdad8e4bd6a1fcd05cda94ffe465

    • SHA512

      260729378ea715a9e755827f6bdb030b0bd7c55767c0de1dd0b9b5b95ee737fe226a0762a13ad2d38a4a90a593f7efa7c969c5c020718af9b4223069d0b88812

    • SSDEEP

      3072:dNQKPWDyUI0iJltZrpRXyy4mcQkmqJtNkIkQJN++2CYpHnOE:dNSDyUItthp9bcQkFki++

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks