General

  • Target

    8a0b92bb9a96a9ab3ea9a86b4d732c5ae0b6bbeea318a95af54ea507422eb6cc

  • Size

    1.1MB

  • Sample

    221030-1qykxscbh5

  • MD5

    90d3a46749064261f52e2b86ba24bdf0

  • SHA1

    4170339ae1697ddf50bfd308eeda65ba863498fe

  • SHA256

    8a0b92bb9a96a9ab3ea9a86b4d732c5ae0b6bbeea318a95af54ea507422eb6cc

  • SHA512

    52a43c6ac13caec8268559cf70b3d3e5e4f573d759d1164ddb2bbc57059e0ac6aadab472e217cd2c3ef6c6ba6e34df759beff8cb8539fe42cef3cf7d99e76774

  • SSDEEP

    24576:2VlVcOsONZ43oyYjnz++7e++2psIawLcInN8eo0bl0RExAPA/2zIEd56Dlm4MFpN:26FWZ43oyYjnz++7e++2psIawLcInN8d

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      8a0b92bb9a96a9ab3ea9a86b4d732c5ae0b6bbeea318a95af54ea507422eb6cc

    • Size

      1.1MB

    • MD5

      90d3a46749064261f52e2b86ba24bdf0

    • SHA1

      4170339ae1697ddf50bfd308eeda65ba863498fe

    • SHA256

      8a0b92bb9a96a9ab3ea9a86b4d732c5ae0b6bbeea318a95af54ea507422eb6cc

    • SHA512

      52a43c6ac13caec8268559cf70b3d3e5e4f573d759d1164ddb2bbc57059e0ac6aadab472e217cd2c3ef6c6ba6e34df759beff8cb8539fe42cef3cf7d99e76774

    • SSDEEP

      24576:2VlVcOsONZ43oyYjnz++7e++2psIawLcInN8eo0bl0RExAPA/2zIEd56Dlm4MFpN:26FWZ43oyYjnz++7e++2psIawLcInN8d

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks