General

  • Target

    26d04111230e2679e5c4e9003df1d1b265f44d1ad0319e08a8bd613325294e2a

  • Size

    528KB

  • Sample

    221004-fl5hfsdba3

  • MD5

    244602fa5040a102e1c43da60fa68be3

  • SHA1

    b03220b33ab6586e4e953278607dfe146b8f0225

  • SHA256

    26d04111230e2679e5c4e9003df1d1b265f44d1ad0319e08a8bd613325294e2a

  • SHA512

    39be91b463c7d39e6bbeb0f09b0a39cd55c81f9e7eb5eac561f2f1be28af7b5f9055c509adad0ee0e1240eebecc66bb18db11a73b04962efeadf36ad3794d23d

  • SSDEEP

    3072:a2N/LzV2ocdHDDvziNQYngAqJdOC9SN2LhaM87fICs532mNot4c383fMkII4RKoy:aNoOWHgAHwUMXR84CB7Qd1T1dp

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      26d04111230e2679e5c4e9003df1d1b265f44d1ad0319e08a8bd613325294e2a

    • Size

      528KB

    • MD5

      244602fa5040a102e1c43da60fa68be3

    • SHA1

      b03220b33ab6586e4e953278607dfe146b8f0225

    • SHA256

      26d04111230e2679e5c4e9003df1d1b265f44d1ad0319e08a8bd613325294e2a

    • SHA512

      39be91b463c7d39e6bbeb0f09b0a39cd55c81f9e7eb5eac561f2f1be28af7b5f9055c509adad0ee0e1240eebecc66bb18db11a73b04962efeadf36ad3794d23d

    • SSDEEP

      3072:a2N/LzV2ocdHDDvziNQYngAqJdOC9SN2LhaM87fICs532mNot4c383fMkII4RKoy:aNoOWHgAHwUMXR84CB7Qd1T1dp

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks