General

  • Target

    9b8556497144b00ea156b734b564ac511ed1a4fd893de68c2be42636aab7853e

  • Size

    421KB

  • Sample

    221029-vmbn4afdc9

  • MD5

    45a33d7c35ac6ecfe769b27fc6af8026

  • SHA1

    5ab17df0614dd5ceb873645fea739cfe19b5d9cf

  • SHA256

    9b8556497144b00ea156b734b564ac511ed1a4fd893de68c2be42636aab7853e

  • SHA512

    651285a84e0f1b2488f59e3eff47b7a2f29f5ed314522bcd3a87f03f8603a2b71815c738fee2380afae0a535007cdc44f6e5d59a3e8c777c2e89e6a206cf66e2

  • SSDEEP

    6144:BWb6GdYJGY1CLKd6Gr5hZH8XL7k19X0eTLE9AIHR1y9X9dYI+mNy:BWbvhLq6ynH8X3k1liaZFY

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      9b8556497144b00ea156b734b564ac511ed1a4fd893de68c2be42636aab7853e

    • Size

      421KB

    • MD5

      45a33d7c35ac6ecfe769b27fc6af8026

    • SHA1

      5ab17df0614dd5ceb873645fea739cfe19b5d9cf

    • SHA256

      9b8556497144b00ea156b734b564ac511ed1a4fd893de68c2be42636aab7853e

    • SHA512

      651285a84e0f1b2488f59e3eff47b7a2f29f5ed314522bcd3a87f03f8603a2b71815c738fee2380afae0a535007cdc44f6e5d59a3e8c777c2e89e6a206cf66e2

    • SSDEEP

      6144:BWb6GdYJGY1CLKd6Gr5hZH8XL7k19X0eTLE9AIHR1y9X9dYI+mNy:BWbvhLq6ynH8X3k1liaZFY

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks