General

  • Target

    18d34599697c8a168ef1af330bf051e59f932e3713f9c42d355aff728cde49a4

  • Size

    417KB

  • Sample

    221020-dg7qxabdd2

  • MD5

    7b6131da9815b01dd5bb4b8880646d70

  • SHA1

    6fb3c03cf807b1b0941f61a4d8892711014bb29a

  • SHA256

    18d34599697c8a168ef1af330bf051e59f932e3713f9c42d355aff728cde49a4

  • SHA512

    234aa4d929385ba1be186b512cdbcd145fa649e4128e805365091dca1b38ef39ac50f9fe4c06e8bec977d56c0f9833cc56743b5b1812a7ab4ffd9c6fccba2abc

  • SSDEEP

    6144:xWb6GdYJGY1CLKd6Gr5YZH8XL7k19X0eTLE9AIHR1y9X9VgLs83F3mR/5S6j:xWbvhLq6y4H8X3k1liaawWF3G/5S6j

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      18d34599697c8a168ef1af330bf051e59f932e3713f9c42d355aff728cde49a4

    • Size

      417KB

    • MD5

      7b6131da9815b01dd5bb4b8880646d70

    • SHA1

      6fb3c03cf807b1b0941f61a4d8892711014bb29a

    • SHA256

      18d34599697c8a168ef1af330bf051e59f932e3713f9c42d355aff728cde49a4

    • SHA512

      234aa4d929385ba1be186b512cdbcd145fa649e4128e805365091dca1b38ef39ac50f9fe4c06e8bec977d56c0f9833cc56743b5b1812a7ab4ffd9c6fccba2abc

    • SSDEEP

      6144:xWb6GdYJGY1CLKd6Gr5YZH8XL7k19X0eTLE9AIHR1y9X9VgLs83F3mR/5S6j:xWbvhLq6y4H8X3k1liaawWF3G/5S6j

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks