General

  • Target

    97d01a48d622f427945682c210db24d5231673ac02f63a8c110d36f1c522c770

  • Size

    167KB

  • Sample

    221020-3qt9lsbehq

  • MD5

    5df3eb371cc4acc53e647378c909efa0

  • SHA1

    6fdd2921a342a2fc046cf31bd7aba952b4436143

  • SHA256

    97d01a48d622f427945682c210db24d5231673ac02f63a8c110d36f1c522c770

  • SHA512

    d70b350154ce8e7d0bba4bb60e2499656f44ad639d16ea787a52daa5a66348f19402dfc0b7d1582b052a9fda4fde4a52922db5e6a8b08a1f16ff37d3faa50472

  • SSDEEP

    3072:3YNQKPWDyioRefVJltZrpRl1P3/djUckTZRmWhEdzbnMolyjXYUlLjp:oNSDyfRO1thpxdjv4L/E9nq7f

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      97d01a48d622f427945682c210db24d5231673ac02f63a8c110d36f1c522c770

    • Size

      167KB

    • MD5

      5df3eb371cc4acc53e647378c909efa0

    • SHA1

      6fdd2921a342a2fc046cf31bd7aba952b4436143

    • SHA256

      97d01a48d622f427945682c210db24d5231673ac02f63a8c110d36f1c522c770

    • SHA512

      d70b350154ce8e7d0bba4bb60e2499656f44ad639d16ea787a52daa5a66348f19402dfc0b7d1582b052a9fda4fde4a52922db5e6a8b08a1f16ff37d3faa50472

    • SSDEEP

      3072:3YNQKPWDyioRefVJltZrpRl1P3/djUckTZRmWhEdzbnMolyjXYUlLjp:oNSDyfRO1thpxdjv4L/E9nq7f

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks