General

  • Target

    c4c36ba668965c7d89ea05924e4f80c05ec70194e7ad6c32a308c31b4f75f4f1

  • Size

    145KB

  • Sample

    221121-kdmd5afa6z

  • MD5

    49178a72748497998ad3bcbe9f123920

  • SHA1

    2601e7f8dd1f2d7baa102ab59a90f526e1644d94

  • SHA256

    c4c36ba668965c7d89ea05924e4f80c05ec70194e7ad6c32a308c31b4f75f4f1

  • SHA512

    2e19335c014f13cb6b5171386c42ad1d18cc9314027673a8aa5207630639c124eac0834d58f89583df73839bbe7d4ec98e468cf477cd877caf13d116f13251a2

  • SSDEEP

    3072:xc3Bx85+ue4m07yKctJjdqimoNBH5J+sAaqAUOK1I/L6B3JxIkr:23x0pkJkimoNtne8z8xIkr

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      c4c36ba668965c7d89ea05924e4f80c05ec70194e7ad6c32a308c31b4f75f4f1

    • Size

      145KB

    • MD5

      49178a72748497998ad3bcbe9f123920

    • SHA1

      2601e7f8dd1f2d7baa102ab59a90f526e1644d94

    • SHA256

      c4c36ba668965c7d89ea05924e4f80c05ec70194e7ad6c32a308c31b4f75f4f1

    • SHA512

      2e19335c014f13cb6b5171386c42ad1d18cc9314027673a8aa5207630639c124eac0834d58f89583df73839bbe7d4ec98e468cf477cd877caf13d116f13251a2

    • SSDEEP

      3072:xc3Bx85+ue4m07yKctJjdqimoNBH5J+sAaqAUOK1I/L6B3JxIkr:23x0pkJkimoNtne8z8xIkr

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks