General

  • Target

    e471db282ee3bf7c540b508c5e69e37a782b5efbd5813d6c79ed6bfa351cf881

  • Size

    97KB

  • Sample

    221106-xadc9sffa6

  • MD5

    0d2755e47c99854c7a0bb827e21b9b33

  • SHA1

    9b4a342b59a99110a17e4b587e2685a7e7d85dd4

  • SHA256

    e471db282ee3bf7c540b508c5e69e37a782b5efbd5813d6c79ed6bfa351cf881

  • SHA512

    be844e4526fe8c80d6b89f3f88a11bc657e0ea5bcf76aa9ea3af2ceaae1c3cadfb0c30c8a80bc1a66bdde0125547455fc5d64026a5a11d6afec60f3685698cb2

  • SSDEEP

    1536:nxAbo1Z3Bs9MfFd5UTi7my+KG2sen7F5PDiyeIR6bgFvzqdNEgg8ddUq:r1Z3BpfFd5+i7myuGZ5PDiy6yzqfE1iP

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      e471db282ee3bf7c540b508c5e69e37a782b5efbd5813d6c79ed6bfa351cf881

    • Size

      97KB

    • MD5

      0d2755e47c99854c7a0bb827e21b9b33

    • SHA1

      9b4a342b59a99110a17e4b587e2685a7e7d85dd4

    • SHA256

      e471db282ee3bf7c540b508c5e69e37a782b5efbd5813d6c79ed6bfa351cf881

    • SHA512

      be844e4526fe8c80d6b89f3f88a11bc657e0ea5bcf76aa9ea3af2ceaae1c3cadfb0c30c8a80bc1a66bdde0125547455fc5d64026a5a11d6afec60f3685698cb2

    • SSDEEP

      1536:nxAbo1Z3Bs9MfFd5UTi7my+KG2sen7F5PDiyeIR6bgFvzqdNEgg8ddUq:r1Z3BpfFd5+i7myuGZ5PDiy6yzqfE1iP

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks