General

  • Target

    98c526bd71b1f5936fea7f5e87147d6681e75710d12327a748ed2f5520b6d51e

  • Size

    900KB

  • Sample

    221121-kjjv7abf47

  • MD5

    3b22978269831fde0f19d1521729d230

  • SHA1

    429946bb188270cdba4498ce3ef6821c369a8639

  • SHA256

    98c526bd71b1f5936fea7f5e87147d6681e75710d12327a748ed2f5520b6d51e

  • SHA512

    19527d46f725fa8dc7a2841549fd1ce516d67028fab343bdf53b4e28854b65ac3b25153fd604c9e3a485604976b57eae6967ab12c20b9f5918477eb8dc945c86

  • SSDEEP

    12288:7ZHj9KDqROdgXv7tx/MvIezifxZUM0FmWSwpTHNU:7hj8QOadDZn0IWTHNU

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      98c526bd71b1f5936fea7f5e87147d6681e75710d12327a748ed2f5520b6d51e

    • Size

      900KB

    • MD5

      3b22978269831fde0f19d1521729d230

    • SHA1

      429946bb188270cdba4498ce3ef6821c369a8639

    • SHA256

      98c526bd71b1f5936fea7f5e87147d6681e75710d12327a748ed2f5520b6d51e

    • SHA512

      19527d46f725fa8dc7a2841549fd1ce516d67028fab343bdf53b4e28854b65ac3b25153fd604c9e3a485604976b57eae6967ab12c20b9f5918477eb8dc945c86

    • SSDEEP

      12288:7ZHj9KDqROdgXv7tx/MvIezifxZUM0FmWSwpTHNU:7hj8QOadDZn0IWTHNU

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks