General

  • Target

    dff365a9f7ae445ee8fe27294d2bb0d6301cd0173b7fc1fb7d3bf7aab519b738

  • Size

    124KB

  • Sample

    221106-xayzzahhan

  • MD5

    03d7e73739020df60ebd84743a9f7e80

  • SHA1

    b8b0c91c121529dc5685d2ebecd43f64472169f5

  • SHA256

    dff365a9f7ae445ee8fe27294d2bb0d6301cd0173b7fc1fb7d3bf7aab519b738

  • SHA512

    1fd54fcc752a9dc28a28b38300eee64092ac272e862320402df80c6f77ea09ea9ae44f69553a6636178f63d1e94822ad5c0e7b86aa4d2c68b437867248005201

  • SSDEEP

    1536:tituLieZvGvscwXo6PJFm4/jXF9FQ4fQw87n26l8bVkZHMxKQKlG0CpOo1fumwMW:ti2XcQo6PNfP87n289sIw0CVuAQKanhR

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      dff365a9f7ae445ee8fe27294d2bb0d6301cd0173b7fc1fb7d3bf7aab519b738

    • Size

      124KB

    • MD5

      03d7e73739020df60ebd84743a9f7e80

    • SHA1

      b8b0c91c121529dc5685d2ebecd43f64472169f5

    • SHA256

      dff365a9f7ae445ee8fe27294d2bb0d6301cd0173b7fc1fb7d3bf7aab519b738

    • SHA512

      1fd54fcc752a9dc28a28b38300eee64092ac272e862320402df80c6f77ea09ea9ae44f69553a6636178f63d1e94822ad5c0e7b86aa4d2c68b437867248005201

    • SSDEEP

      1536:tituLieZvGvscwXo6PJFm4/jXF9FQ4fQw87n26l8bVkZHMxKQKlG0CpOo1fumwMW:ti2XcQo6PNfP87n289sIw0CVuAQKanhR

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks