General

  • Target

    4f27f6e56e857eda548be39d258f094c9c0e8c203d96c35bc2af664c57b9dae8

  • Size

    168KB

  • Sample

    221030-1tqpgsdcdr

  • MD5

    a0e53acd9b5a01c3c245e261ece3e094

  • SHA1

    78fc91272ec87678dc6b2aa5424591d4ec09277c

  • SHA256

    4f27f6e56e857eda548be39d258f094c9c0e8c203d96c35bc2af664c57b9dae8

  • SHA512

    ab4969d69fbfb1439546cebde99f3b5361b3135f36c1ee06096fdf532ce32d744b0d3d55a3527026b45cd686dc4e1bc06c7ca6edb44018251c8bccb0c088f043

  • SSDEEP

    3072:tNQKPWDylI01JltZrpR32lZFMvzsU95Nv+aYSgT3eW7:tNSDylIathpgaz19vvXtgTB

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      4f27f6e56e857eda548be39d258f094c9c0e8c203d96c35bc2af664c57b9dae8

    • Size

      168KB

    • MD5

      a0e53acd9b5a01c3c245e261ece3e094

    • SHA1

      78fc91272ec87678dc6b2aa5424591d4ec09277c

    • SHA256

      4f27f6e56e857eda548be39d258f094c9c0e8c203d96c35bc2af664c57b9dae8

    • SHA512

      ab4969d69fbfb1439546cebde99f3b5361b3135f36c1ee06096fdf532ce32d744b0d3d55a3527026b45cd686dc4e1bc06c7ca6edb44018251c8bccb0c088f043

    • SSDEEP

      3072:tNQKPWDylI01JltZrpR32lZFMvzsU95Nv+aYSgT3eW7:tNSDylIathpgaz19vvXtgTB

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks