General

  • Target

    3f6e658e673bc73e15f6f581326d470ec48e98dc458aa0d764c33d0238cf04e6

  • Size

    661KB

  • Sample

    221011-nh3tfscba7

  • MD5

    01733c506237e70ccb795e0a1a17f920

  • SHA1

    53534bc5708c13b6a1448d4eb42aa6313dec49d7

  • SHA256

    3f6e658e673bc73e15f6f581326d470ec48e98dc458aa0d764c33d0238cf04e6

  • SHA512

    6611defc0ac42044cefea066b3eabfd6ab1bb4158523b2851b0b78edf1090ab9a23bdb22cbbfb613268547767ddb91bb2d17060a0d3f2966aaea7bfe13a665b2

  • SSDEEP

    12288:zGRDU5ervjUo9BEgfYoIpqYSc53an9lpGN4FGtTRIMbF9MY3M:zGRmervjUoDEgfnIycJaBhYtTRTbPM0M

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      3f6e658e673bc73e15f6f581326d470ec48e98dc458aa0d764c33d0238cf04e6

    • Size

      661KB

    • MD5

      01733c506237e70ccb795e0a1a17f920

    • SHA1

      53534bc5708c13b6a1448d4eb42aa6313dec49d7

    • SHA256

      3f6e658e673bc73e15f6f581326d470ec48e98dc458aa0d764c33d0238cf04e6

    • SHA512

      6611defc0ac42044cefea066b3eabfd6ab1bb4158523b2851b0b78edf1090ab9a23bdb22cbbfb613268547767ddb91bb2d17060a0d3f2966aaea7bfe13a665b2

    • SSDEEP

      12288:zGRDU5ervjUo9BEgfYoIpqYSc53an9lpGN4FGtTRIMbF9MY3M:zGRmervjUoDEgfnIycJaBhYtTRTbPM0M

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks