General

  • Target

    c6e2fccd7ea71b3b5567de1b77eafb7aff20c2bea581619dae599dc9eebf06e7

  • Size

    120KB

  • Sample

    221021-f9cscadggq

  • MD5

    5429eca8c68d697d8577c35d14ca3090

  • SHA1

    54bb976eb4ab550fcb84e0a3ec3f80b5dce0775b

  • SHA256

    c6e2fccd7ea71b3b5567de1b77eafb7aff20c2bea581619dae599dc9eebf06e7

  • SHA512

    36fecad3320b7bff6af9a3dcbc7ab999067fd38726d1004d62449e61ad0e846c3259458a6bee092dcf0cf3a8368f61d90d4e2cdc2281f8494d5a6c317f1c24dd

  • SSDEEP

    3072:G9I05pmuZhQieJNIi4gnn8sQVROd0dGNTd8:o5wuzQvIwn8DVROdY

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c6e2fccd7ea71b3b5567de1b77eafb7aff20c2bea581619dae599dc9eebf06e7

    • Size

      120KB

    • MD5

      5429eca8c68d697d8577c35d14ca3090

    • SHA1

      54bb976eb4ab550fcb84e0a3ec3f80b5dce0775b

    • SHA256

      c6e2fccd7ea71b3b5567de1b77eafb7aff20c2bea581619dae599dc9eebf06e7

    • SHA512

      36fecad3320b7bff6af9a3dcbc7ab999067fd38726d1004d62449e61ad0e846c3259458a6bee092dcf0cf3a8368f61d90d4e2cdc2281f8494d5a6c317f1c24dd

    • SSDEEP

      3072:G9I05pmuZhQieJNIi4gnn8sQVROd0dGNTd8:o5wuzQvIwn8DVROdY

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks