General

  • Target

    29497a7cdff52e1b7dc35b106798620a1aa297d357be3e14703b18b2e68742b8

  • Size

    205KB

  • Sample

    221011-nj75kacbe9

  • MD5

    408a2b69ed4f0b896b6484430738d6b9

  • SHA1

    457aad2b989d2d16b9c6bd153fb1eeb2ff732cea

  • SHA256

    29497a7cdff52e1b7dc35b106798620a1aa297d357be3e14703b18b2e68742b8

  • SHA512

    f8455f8a0b4205433a0f2a982ef8d915911b8a9dfb262c07a150a59d0e4d52b96c427580ff5cb2d78e87360c2d4c6493ebdb4d920100a80ccec0213bf317de8a

  • SSDEEP

    3072:bK2BNz4k2a+RvXp5ApGbpV4kHs2vhlUr7ZYZozjXbDzveQ0WZx7St:lFz1YivrDzh0WZx0

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      29497a7cdff52e1b7dc35b106798620a1aa297d357be3e14703b18b2e68742b8

    • Size

      205KB

    • MD5

      408a2b69ed4f0b896b6484430738d6b9

    • SHA1

      457aad2b989d2d16b9c6bd153fb1eeb2ff732cea

    • SHA256

      29497a7cdff52e1b7dc35b106798620a1aa297d357be3e14703b18b2e68742b8

    • SHA512

      f8455f8a0b4205433a0f2a982ef8d915911b8a9dfb262c07a150a59d0e4d52b96c427580ff5cb2d78e87360c2d4c6493ebdb4d920100a80ccec0213bf317de8a

    • SSDEEP

      3072:bK2BNz4k2a+RvXp5ApGbpV4kHs2vhlUr7ZYZozjXbDzveQ0WZx7St:lFz1YivrDzh0WZx0

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks