General

  • Target

    dd51ef3c859adc3ffde041de0be4c66e8bacf9c0d2127ab59e6e877699bb1d72

  • Size

    322KB

  • Sample

    221020-nqkylsbggl

  • MD5

    90319367502e13d62ca35c5428ff5965

  • SHA1

    10decce8d9a1253a89d9ac6dd2826fe349ab011e

  • SHA256

    dd51ef3c859adc3ffde041de0be4c66e8bacf9c0d2127ab59e6e877699bb1d72

  • SHA512

    c63e8b1f7cb47c6e9bce45abde75ec6befbe82169add1ccfb30498eec063d7befc723fa4f3471065a8f2eb0955703787ab2b680560471199ea57ff2e6be53aa3

  • SSDEEP

    6144:eR1VSKivAgcPYZFhptZfyTyPT0MfGUgBRKmHb31p2XgEyM4lnsJ6:elSFvAg+83ptZqTyPHf3gBP7X6gjA6

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      dd51ef3c859adc3ffde041de0be4c66e8bacf9c0d2127ab59e6e877699bb1d72

    • Size

      322KB

    • MD5

      90319367502e13d62ca35c5428ff5965

    • SHA1

      10decce8d9a1253a89d9ac6dd2826fe349ab011e

    • SHA256

      dd51ef3c859adc3ffde041de0be4c66e8bacf9c0d2127ab59e6e877699bb1d72

    • SHA512

      c63e8b1f7cb47c6e9bce45abde75ec6befbe82169add1ccfb30498eec063d7befc723fa4f3471065a8f2eb0955703787ab2b680560471199ea57ff2e6be53aa3

    • SSDEEP

      6144:eR1VSKivAgcPYZFhptZfyTyPT0MfGUgBRKmHb31p2XgEyM4lnsJ6:elSFvAg+83ptZqTyPHf3gBP7X6gjA6

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks