General

  • Target

    59d9507c3ebdd3fa4941572da5f0fa12052208faeb6bb2362a5f22432e732c67

  • Size

    113KB

  • Sample

    221121-ksanwaca65

  • MD5

    3bdb17bd97e2fcfea0c6c61025343ce0

  • SHA1

    6597b088ba8c24535b5461ab3e0cd3ffc4e1d589

  • SHA256

    59d9507c3ebdd3fa4941572da5f0fa12052208faeb6bb2362a5f22432e732c67

  • SHA512

    f52f9e2a756700fc83c1480d9cc171daa8b3fd12e7b6d7b4a550c147eb6e775e6d089f644bf68f876c8db833ee5490f78474ab4ae0559c6f24906d5472c2a211

  • SSDEEP

    1536:jY8eqjOolZ1w3tRc5h0xBejiFMp8EMDQlNn+0C5CF5DctUTUj6BSV5wV:s8jOo/1w3U5wALp8EMklNnSQ5Dc7W

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      59d9507c3ebdd3fa4941572da5f0fa12052208faeb6bb2362a5f22432e732c67

    • Size

      113KB

    • MD5

      3bdb17bd97e2fcfea0c6c61025343ce0

    • SHA1

      6597b088ba8c24535b5461ab3e0cd3ffc4e1d589

    • SHA256

      59d9507c3ebdd3fa4941572da5f0fa12052208faeb6bb2362a5f22432e732c67

    • SHA512

      f52f9e2a756700fc83c1480d9cc171daa8b3fd12e7b6d7b4a550c147eb6e775e6d089f644bf68f876c8db833ee5490f78474ab4ae0559c6f24906d5472c2a211

    • SSDEEP

      1536:jY8eqjOolZ1w3tRc5h0xBejiFMp8EMDQlNn+0C5CF5DctUTUj6BSV5wV:s8jOo/1w3U5wALp8EMklNnSQ5Dc7W

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks