General

  • Target

    024618df688995c084cdf4735ff7a06c6684c06e7aaf8dcdcb0c66e171310969

  • Size

    356KB

  • Sample

    221030-cdys6agae5

  • MD5

    8512d08bc9afa425c41556ee45f01ffd

  • SHA1

    1a01c074c7f97a3dfa85e61a2052793d790894f3

  • SHA256

    024618df688995c084cdf4735ff7a06c6684c06e7aaf8dcdcb0c66e171310969

  • SHA512

    123e06bdf26e54b53fced7ce10917cc04fb587400e61468f05bd4bc8b4e6dfd800f3515a11537f77eb7917bc250dd6e036e3df3be89821b47bca653f7dc4a352

  • SSDEEP

    6144:U92sKwSjA8EV9YAQ89cfwPYHVqit1ETinAOcDcwqqDLurqT9tZYZxc3SLS/OFQ:U92sKHJ7OYHVq/enZqnuOtIxc3yN+

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      024618df688995c084cdf4735ff7a06c6684c06e7aaf8dcdcb0c66e171310969

    • Size

      356KB

    • MD5

      8512d08bc9afa425c41556ee45f01ffd

    • SHA1

      1a01c074c7f97a3dfa85e61a2052793d790894f3

    • SHA256

      024618df688995c084cdf4735ff7a06c6684c06e7aaf8dcdcb0c66e171310969

    • SHA512

      123e06bdf26e54b53fced7ce10917cc04fb587400e61468f05bd4bc8b4e6dfd800f3515a11537f77eb7917bc250dd6e036e3df3be89821b47bca653f7dc4a352

    • SSDEEP

      6144:U92sKwSjA8EV9YAQ89cfwPYHVqit1ETinAOcDcwqqDLurqT9tZYZxc3SLS/OFQ:U92sKHJ7OYHVq/enZqnuOtIxc3yN+

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks