General

  • Target

    515e2a976976258de5ea9c564f8ce5fb8475b57d15d7dfd6c978c0a54ea07f05

  • Size

    103KB

  • Sample

    221030-b984bsggbj

  • MD5

    a39a941652f4ff0dff5ad20ad9ab1050

  • SHA1

    d27e962d0d5c2752d5642fe5399a054080580947

  • SHA256

    515e2a976976258de5ea9c564f8ce5fb8475b57d15d7dfd6c978c0a54ea07f05

  • SHA512

    f116e98d6fa84d1cb84051fca1ad9cbea0d47aa96b440a47e86f5f3222e6a55f10f63db26635c8f42b1f8dafeeff9b29b534585973b7ee40e37324ae34ff3a6a

  • SSDEEP

    3072:r3K3J/jOYqL5KxZAeaTiCNPS886yfXSI6Sp4GfJ:UJ/jOY8ofaTZql6yvS/HGfJ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      515e2a976976258de5ea9c564f8ce5fb8475b57d15d7dfd6c978c0a54ea07f05

    • Size

      103KB

    • MD5

      a39a941652f4ff0dff5ad20ad9ab1050

    • SHA1

      d27e962d0d5c2752d5642fe5399a054080580947

    • SHA256

      515e2a976976258de5ea9c564f8ce5fb8475b57d15d7dfd6c978c0a54ea07f05

    • SHA512

      f116e98d6fa84d1cb84051fca1ad9cbea0d47aa96b440a47e86f5f3222e6a55f10f63db26635c8f42b1f8dafeeff9b29b534585973b7ee40e37324ae34ff3a6a

    • SSDEEP

      3072:r3K3J/jOYqL5KxZAeaTiCNPS886yfXSI6Sp4GfJ:UJ/jOY8ofaTZql6yvS/HGfJ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks