General

  • Target

    8b50025f5d3bc2493e951a6930caf364f9ba03f14be9cbd5992af15b4c8327f0

  • Size

    136KB

  • Sample

    221029-vmr13sfde4

  • MD5

    84365d62e0ac22d8e4262b6d897e028d

  • SHA1

    350952b5b6f926d9cd7add57786a0117a8a046e9

  • SHA256

    8b50025f5d3bc2493e951a6930caf364f9ba03f14be9cbd5992af15b4c8327f0

  • SHA512

    168721d07073f7ff0e0dcf63ff3d2373eeb460265cf9f4075e6e9ecce48b59cc69304d25905e78a430c5e2daf77b3befb50edf88a4f08a6d26b882d014751b54

  • SSDEEP

    1536:zba38fnxoCul5Ky5Hob7+AQ4KEWnMnW/xLM9FkIkjUNSZ8qUpFf5s5vR13ZJNQnw:zbHxoCA7Ib7h9KEifvZ8/ptCKTpZgZ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      8b50025f5d3bc2493e951a6930caf364f9ba03f14be9cbd5992af15b4c8327f0

    • Size

      136KB

    • MD5

      84365d62e0ac22d8e4262b6d897e028d

    • SHA1

      350952b5b6f926d9cd7add57786a0117a8a046e9

    • SHA256

      8b50025f5d3bc2493e951a6930caf364f9ba03f14be9cbd5992af15b4c8327f0

    • SHA512

      168721d07073f7ff0e0dcf63ff3d2373eeb460265cf9f4075e6e9ecce48b59cc69304d25905e78a430c5e2daf77b3befb50edf88a4f08a6d26b882d014751b54

    • SSDEEP

      1536:zba38fnxoCul5Ky5Hob7+AQ4KEWnMnW/xLM9FkIkjUNSZ8qUpFf5s5vR13ZJNQnw:zbHxoCA7Ib7h9KEifvZ8/ptCKTpZgZ

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks