General

  • Target

    64c6d89ef5ce90db2ae6ad52998252da70de429628a701467c54638117def812

  • Size

    164KB

  • Sample

    221106-xpkqwsaegl

  • MD5

    0c32c2dec75fc8c5d56c83c31b090a81

  • SHA1

    0ccf53af930920ea4c888c814af97fbfb30efc03

  • SHA256

    64c6d89ef5ce90db2ae6ad52998252da70de429628a701467c54638117def812

  • SHA512

    59ecb0c66674593ace69f54c6009edfbd70f741e60be7aa0f540f0d8fddfba5ea77a2b56d00cf22748c6117008013213bc35a1b2fb16bcf9617a63d533869f33

  • SSDEEP

    3072:DNQKPWDy3I0hJltZrpRRyBvAcDE8dJJBQWryGJqJ75ubyoWnDDr:DNSDy3ISthpk9E8zvtyGm1ubYvr

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      64c6d89ef5ce90db2ae6ad52998252da70de429628a701467c54638117def812

    • Size

      164KB

    • MD5

      0c32c2dec75fc8c5d56c83c31b090a81

    • SHA1

      0ccf53af930920ea4c888c814af97fbfb30efc03

    • SHA256

      64c6d89ef5ce90db2ae6ad52998252da70de429628a701467c54638117def812

    • SHA512

      59ecb0c66674593ace69f54c6009edfbd70f741e60be7aa0f540f0d8fddfba5ea77a2b56d00cf22748c6117008013213bc35a1b2fb16bcf9617a63d533869f33

    • SSDEEP

      3072:DNQKPWDy3I0hJltZrpRRyBvAcDE8dJJBQWryGJqJ75ubyoWnDDr:DNSDy3ISthpk9E8zvtyGm1ubYvr

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks