General

  • Target

    d6460765b1a383e9225036a62eb19f99c89a9608c671a16e5f7b0a28191c5d43

  • Size

    216KB

  • Sample

    221030-1lqphschel

  • MD5

    a18313844fdd46bb26b4b23d4b11ba30

  • SHA1

    f45feca7187cc98b9f7fbe2148383d0c7383a1a4

  • SHA256

    d6460765b1a383e9225036a62eb19f99c89a9608c671a16e5f7b0a28191c5d43

  • SHA512

    c13e292b02962bd9f313920cb6ccc63e07758b6469bbd40c2f16d055a4595ad22926c33ae4686a3cd20f87ee09b019550c0d41173c8cb15458f80f0b8e48e4d5

  • SSDEEP

    6144:H5wplxAAZcR/6TkIN2OKB8g+3/2bArgwL2k1iN:H5eXC1ryg+ubKg+2k

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      d6460765b1a383e9225036a62eb19f99c89a9608c671a16e5f7b0a28191c5d43

    • Size

      216KB

    • MD5

      a18313844fdd46bb26b4b23d4b11ba30

    • SHA1

      f45feca7187cc98b9f7fbe2148383d0c7383a1a4

    • SHA256

      d6460765b1a383e9225036a62eb19f99c89a9608c671a16e5f7b0a28191c5d43

    • SHA512

      c13e292b02962bd9f313920cb6ccc63e07758b6469bbd40c2f16d055a4595ad22926c33ae4686a3cd20f87ee09b019550c0d41173c8cb15458f80f0b8e48e4d5

    • SSDEEP

      6144:H5wplxAAZcR/6TkIN2OKB8g+3/2bArgwL2k1iN:H5eXC1ryg+ubKg+2k

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks