General

  • Target

    7f6bf89a6a23a501ee708f9a3a6adc282cc420ea97b8256fab21ecf006ddd43d

  • Size

    380KB

  • Sample

    221106-xla3aaadcn

  • MD5

    0e3ec8209e255fe2fe41a645c56fc810

  • SHA1

    0d32b8ec3922cde3f6e306a023c8e2f0ac464032

  • SHA256

    7f6bf89a6a23a501ee708f9a3a6adc282cc420ea97b8256fab21ecf006ddd43d

  • SHA512

    cb3f84e89d7c0464c89e94c87dd57ada5ecdb873367c10c423f444294ecc915d600e882f15c1580019a3e2c81dfd3160b09c7668f29cf3898f71bd85c3e5c2a2

  • SSDEEP

    6144:/bB8IHeMQmwhIWPrjAlZbXJsPAzCi7/isDpWlbZAG++KCRvN:/thHeMQvZPrgZbWCCi7V1Wl1AG/KCRF

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      7f6bf89a6a23a501ee708f9a3a6adc282cc420ea97b8256fab21ecf006ddd43d

    • Size

      380KB

    • MD5

      0e3ec8209e255fe2fe41a645c56fc810

    • SHA1

      0d32b8ec3922cde3f6e306a023c8e2f0ac464032

    • SHA256

      7f6bf89a6a23a501ee708f9a3a6adc282cc420ea97b8256fab21ecf006ddd43d

    • SHA512

      cb3f84e89d7c0464c89e94c87dd57ada5ecdb873367c10c423f444294ecc915d600e882f15c1580019a3e2c81dfd3160b09c7668f29cf3898f71bd85c3e5c2a2

    • SSDEEP

      6144:/bB8IHeMQmwhIWPrjAlZbXJsPAzCi7/isDpWlbZAG++KCRvN:/thHeMQvZPrgZbWCCi7V1Wl1AG/KCRF

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks