General

  • Target

    22b1b9f78f6ee25852b1ba10cdfe03df351c77f9ba6bb48f95696ad74a0ec25f

  • Size

    165KB

  • Sample

    221121-kzf48scc95

  • MD5

    282462d06712b01d3ca792ea4f465430

  • SHA1

    a2abda6ec40e2d46886c572ffbd9f38a0db2b44a

  • SHA256

    22b1b9f78f6ee25852b1ba10cdfe03df351c77f9ba6bb48f95696ad74a0ec25f

  • SHA512

    5206d831a4ff3ce2a70833a482fb1afb51fc515d5720c63704da84ee3356b2438a2ccf632a7781df552b4413b0f026f7455fa6b92c31f65133453aedcb00a5f4

  • SSDEEP

    3072:8jJ2nbppQmJ2AsxtG0AkxLBShUsmowl2l3RAWxYE3UOfeakg3XTsJsKf:8q69AsxtGVuTgrl3ZxYuUda5HgJn

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      22b1b9f78f6ee25852b1ba10cdfe03df351c77f9ba6bb48f95696ad74a0ec25f

    • Size

      165KB

    • MD5

      282462d06712b01d3ca792ea4f465430

    • SHA1

      a2abda6ec40e2d46886c572ffbd9f38a0db2b44a

    • SHA256

      22b1b9f78f6ee25852b1ba10cdfe03df351c77f9ba6bb48f95696ad74a0ec25f

    • SHA512

      5206d831a4ff3ce2a70833a482fb1afb51fc515d5720c63704da84ee3356b2438a2ccf632a7781df552b4413b0f026f7455fa6b92c31f65133453aedcb00a5f4

    • SSDEEP

      3072:8jJ2nbppQmJ2AsxtG0AkxLBShUsmowl2l3RAWxYE3UOfeakg3XTsJsKf:8q69AsxtGVuTgrl3ZxYuUda5HgJn

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks