General

  • Target

    67b4e3aa581dcaef89efd26589ed32687f578483ce29d4816b204e7570cb7ef6

  • Size

    973KB

  • Sample

    221123-tan8zsde29

  • MD5

    4892729b6c79184295f726f9af76c380

  • SHA1

    b468ccf7d8dc8fb7df2e0ea7906582c24b8c512c

  • SHA256

    67b4e3aa581dcaef89efd26589ed32687f578483ce29d4816b204e7570cb7ef6

  • SHA512

    de7519e966094c034edca7aa00523ea44404a35398fe40c30718c8e9552230e1f66f4c9f9456e14d2aa7a4db37f1bd00593c9635838aae9e2067eee8874b252a

  • SSDEEP

    24576:BmT0SFxlmXKahUILkybFSkQnGfrgeamBPueXSl4pYX+Exf:BmTHPlQDLfB/QGzgea2ueXSl4pYuExf

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      67b4e3aa581dcaef89efd26589ed32687f578483ce29d4816b204e7570cb7ef6

    • Size

      973KB

    • MD5

      4892729b6c79184295f726f9af76c380

    • SHA1

      b468ccf7d8dc8fb7df2e0ea7906582c24b8c512c

    • SHA256

      67b4e3aa581dcaef89efd26589ed32687f578483ce29d4816b204e7570cb7ef6

    • SHA512

      de7519e966094c034edca7aa00523ea44404a35398fe40c30718c8e9552230e1f66f4c9f9456e14d2aa7a4db37f1bd00593c9635838aae9e2067eee8874b252a

    • SSDEEP

      24576:BmT0SFxlmXKahUILkybFSkQnGfrgeamBPueXSl4pYX+Exf:BmTHPlQDLfB/QGzgea2ueXSl4pYuExf

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks