General

  • Target

    2a934a492cd119ec165db9a3accb685038b517e6e68d239ac8db8e30a3878e08

  • Size

    100KB

  • Sample

    221030-1wwnhsceb9

  • MD5

    90d6d965676df6962ee917bfe7263a42

  • SHA1

    3a899856fe57b48cf3d015a27073d3f7eb40b550

  • SHA256

    2a934a492cd119ec165db9a3accb685038b517e6e68d239ac8db8e30a3878e08

  • SHA512

    feca3ae50e18ade3f4f1fd74c1f0a21cc126b4a5db4522defed7d2d9f4fb995a5e5cf254500f099035978c9e46004b333a26d26c0d86e33927a2f762c0dfb262

  • SSDEEP

    1536:C+IA/9uNxrMbVLNhhm6ephSzD34VUusFsNO3TY+kyBGileP7dNZXauZc2hA1i4d:F7or4LdSphSzD317sNoTI65oP7TUuGd

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      2a934a492cd119ec165db9a3accb685038b517e6e68d239ac8db8e30a3878e08

    • Size

      100KB

    • MD5

      90d6d965676df6962ee917bfe7263a42

    • SHA1

      3a899856fe57b48cf3d015a27073d3f7eb40b550

    • SHA256

      2a934a492cd119ec165db9a3accb685038b517e6e68d239ac8db8e30a3878e08

    • SHA512

      feca3ae50e18ade3f4f1fd74c1f0a21cc126b4a5db4522defed7d2d9f4fb995a5e5cf254500f099035978c9e46004b333a26d26c0d86e33927a2f762c0dfb262

    • SSDEEP

      1536:C+IA/9uNxrMbVLNhhm6ephSzD34VUusFsNO3TY+kyBGileP7dNZXauZc2hA1i4d:F7or4LdSphSzD317sNoTI65oP7TUuGd

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks