General

  • Target

    7de6c7a841bef7dbc0c2d1a13e8ca334c6f5b4fff016f7d8ddd91416546ac8a8

  • Size

    90KB

  • Sample

    221106-xlc7msadcq

  • MD5

    0e664c2d1285b7f5fe69a501190c28dd

  • SHA1

    852b421ba57516a7840cbf03affd7a82e730fc65

  • SHA256

    7de6c7a841bef7dbc0c2d1a13e8ca334c6f5b4fff016f7d8ddd91416546ac8a8

  • SHA512

    b08a8b33a6610febd29ae1fe2bd549fb18e882bf79dfcecfc1f12ea176ca69028c304d5f4cb3e5f16ed453a4a47ebd7840e5530e4e382f99311ed9b28c78db9d

  • SSDEEP

    1536:bAGBr3MQQyK6CtNlGkq2cxRZpUi0DeRhSfyB1Cqj8PGp7jxxCqQYE3MJG:b+bpDcMTDeqccPPsjC9SG

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      7de6c7a841bef7dbc0c2d1a13e8ca334c6f5b4fff016f7d8ddd91416546ac8a8

    • Size

      90KB

    • MD5

      0e664c2d1285b7f5fe69a501190c28dd

    • SHA1

      852b421ba57516a7840cbf03affd7a82e730fc65

    • SHA256

      7de6c7a841bef7dbc0c2d1a13e8ca334c6f5b4fff016f7d8ddd91416546ac8a8

    • SHA512

      b08a8b33a6610febd29ae1fe2bd549fb18e882bf79dfcecfc1f12ea176ca69028c304d5f4cb3e5f16ed453a4a47ebd7840e5530e4e382f99311ed9b28c78db9d

    • SSDEEP

      1536:bAGBr3MQQyK6CtNlGkq2cxRZpUi0DeRhSfyB1Cqj8PGp7jxxCqQYE3MJG:b+bpDcMTDeqccPPsjC9SG

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks