General

  • Target

    ef11a810fb034c5528893676806b42453bea2b50c532c4893a0a58d832ea0c5b

  • Size

    96KB

  • Sample

    221030-b2mv5agchl

  • MD5

    a31e802a765513c7176bba8f003c9840

  • SHA1

    d241acca6d72808afff8d19bed63ee3171876403

  • SHA256

    ef11a810fb034c5528893676806b42453bea2b50c532c4893a0a58d832ea0c5b

  • SHA512

    a4c4a5a9fffdbba0e62355aebc500d5367e948a39f87efc981ed2dab56977bb3740eebb8e2521a6357f81b8e666e95a8d484574ea99c6903cd994c9250ec61d3

  • SSDEEP

    3072:Ma/SCKEMwMECTppKjD/P3EtKrgzemxII4zH4wZi7p:F/SCKEMXtpK3/P3trgamKI4zN4

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      ef11a810fb034c5528893676806b42453bea2b50c532c4893a0a58d832ea0c5b

    • Size

      96KB

    • MD5

      a31e802a765513c7176bba8f003c9840

    • SHA1

      d241acca6d72808afff8d19bed63ee3171876403

    • SHA256

      ef11a810fb034c5528893676806b42453bea2b50c532c4893a0a58d832ea0c5b

    • SHA512

      a4c4a5a9fffdbba0e62355aebc500d5367e948a39f87efc981ed2dab56977bb3740eebb8e2521a6357f81b8e666e95a8d484574ea99c6903cd994c9250ec61d3

    • SSDEEP

      3072:Ma/SCKEMwMECTppKjD/P3EtKrgzemxII4zH4wZi7p:F/SCKEMXtpK3/P3trgamKI4zN4

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Drops file in Drivers directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks