General

  • Target

    8214a469a9fbd451c9eb9b0a3df150f9c92df7021124f468284dac3c64630c78

  • Size

    449KB

  • Sample

    221028-x9lhxschfm

  • MD5

    0c126287b8276ab5155d4346186bbeb0

  • SHA1

    5966f2efa23047166467cc86cf5b948d80a7403a

  • SHA256

    8214a469a9fbd451c9eb9b0a3df150f9c92df7021124f468284dac3c64630c78

  • SHA512

    9d7c6bda93e3dc720e367163854dc825d0feee7005c72c0a0a60f8f9e5c0e244fcffa5d346e8ce733bddcca86184c18047d4a4245dc8fc92f76240a0aad8a2ce

  • SSDEEP

    6144:7IpasPTvQ7Eqs3b7smSgAAPqqtNjrYrI3U7o25vODuBzSaKnJ3bo:sk4bNAGhUN7UDuBzBKa

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      8214a469a9fbd451c9eb9b0a3df150f9c92df7021124f468284dac3c64630c78

    • Size

      449KB

    • MD5

      0c126287b8276ab5155d4346186bbeb0

    • SHA1

      5966f2efa23047166467cc86cf5b948d80a7403a

    • SHA256

      8214a469a9fbd451c9eb9b0a3df150f9c92df7021124f468284dac3c64630c78

    • SHA512

      9d7c6bda93e3dc720e367163854dc825d0feee7005c72c0a0a60f8f9e5c0e244fcffa5d346e8ce733bddcca86184c18047d4a4245dc8fc92f76240a0aad8a2ce

    • SSDEEP

      6144:7IpasPTvQ7Eqs3b7smSgAAPqqtNjrYrI3U7o25vODuBzSaKnJ3bo:sk4bNAGhUN7UDuBzBKa

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks