General

  • Target

    06a9db87676afe60f09d8b69252d65f3a5c2d86b508825465f8cbd43209f95cc

  • Size

    126KB

  • Sample

    221107-vgpnrsgha3

  • MD5

    0cfd6964cc4ba51a2c8d2aaa50035bef

  • SHA1

    1a5d0b7e4c6760f442be3a2374760f7942e1c229

  • SHA256

    06a9db87676afe60f09d8b69252d65f3a5c2d86b508825465f8cbd43209f95cc

  • SHA512

    9ca0e271e518095954ea55e92963fc7b0ff029f8d1edcdfd6bbb927b50f8288d58fc8907cb254c46267096ad11ac2fefffb6a3b78cd13a05cb5eb5472d87a01a

  • SSDEEP

    3072:qQI+RTXJPceAnJZMwDhDeWs/74Y/dZ8szhTzcOTr/a/dB:qWpmnJXDsEY1Z88hZ/a/P

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      06a9db87676afe60f09d8b69252d65f3a5c2d86b508825465f8cbd43209f95cc

    • Size

      126KB

    • MD5

      0cfd6964cc4ba51a2c8d2aaa50035bef

    • SHA1

      1a5d0b7e4c6760f442be3a2374760f7942e1c229

    • SHA256

      06a9db87676afe60f09d8b69252d65f3a5c2d86b508825465f8cbd43209f95cc

    • SHA512

      9ca0e271e518095954ea55e92963fc7b0ff029f8d1edcdfd6bbb927b50f8288d58fc8907cb254c46267096ad11ac2fefffb6a3b78cd13a05cb5eb5472d87a01a

    • SSDEEP

      3072:qQI+RTXJPceAnJZMwDhDeWs/74Y/dZ8szhTzcOTr/a/dB:qWpmnJXDsEY1Z88hZ/a/P

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks