General

  • Target

    84e912da769e0cffcb7eece43b665cf6fd0775d72133d4261bdcb5192a352c76

  • Size

    152KB

  • Sample

    221106-xkg47sachr

  • MD5

    01faa7ad620f8461904c07374ab01ab0

  • SHA1

    622e8ba8267633ad4e777b439e34703168f46ab6

  • SHA256

    84e912da769e0cffcb7eece43b665cf6fd0775d72133d4261bdcb5192a352c76

  • SHA512

    7858e3f367aafb92ed9c39757d64a9633342386edf560a2692c351cc0fff78e30679907d011b33a94c680311d78ec0b8f912e1513589a36e586451818b424b37

  • SSDEEP

    3072:Cryg2p7Zqe8MoN7kfJBoz6vljqlvcp+BNwShOjmrNlDKbEc3:t8Mi7IezgjNgC3

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      84e912da769e0cffcb7eece43b665cf6fd0775d72133d4261bdcb5192a352c76

    • Size

      152KB

    • MD5

      01faa7ad620f8461904c07374ab01ab0

    • SHA1

      622e8ba8267633ad4e777b439e34703168f46ab6

    • SHA256

      84e912da769e0cffcb7eece43b665cf6fd0775d72133d4261bdcb5192a352c76

    • SHA512

      7858e3f367aafb92ed9c39757d64a9633342386edf560a2692c351cc0fff78e30679907d011b33a94c680311d78ec0b8f912e1513589a36e586451818b424b37

    • SSDEEP

      3072:Cryg2p7Zqe8MoN7kfJBoz6vljqlvcp+BNwShOjmrNlDKbEc3:t8Mi7IezgjNgC3

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks