General

  • Target

    b67419393ce91976b8d545d305045db7bef215d876d704bdd5ea5f606bf847a5

  • Size

    656KB

  • Sample

    221123-tegdyagh6s

  • MD5

    54f2aacb9fb8dff227d2adf5204012ee

  • SHA1

    2031a8102718a82f96b2fd3cc7c168dc2d764c06

  • SHA256

    b67419393ce91976b8d545d305045db7bef215d876d704bdd5ea5f606bf847a5

  • SHA512

    67a2e177523f78ad34f0895ccf7e0185f779be1605a54978d1687234aa49ccd1a594a734dfc2a78174726373046ab8c3a51be34c54e41955521f62faa4043b3e

  • SSDEEP

    12288:z/W72HKq+w07BTQoPo+N+E5cvR9joSr+IottPbYCYFp:ClqB07k7E5WR9JzottPb+p

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      b67419393ce91976b8d545d305045db7bef215d876d704bdd5ea5f606bf847a5

    • Size

      656KB

    • MD5

      54f2aacb9fb8dff227d2adf5204012ee

    • SHA1

      2031a8102718a82f96b2fd3cc7c168dc2d764c06

    • SHA256

      b67419393ce91976b8d545d305045db7bef215d876d704bdd5ea5f606bf847a5

    • SHA512

      67a2e177523f78ad34f0895ccf7e0185f779be1605a54978d1687234aa49ccd1a594a734dfc2a78174726373046ab8c3a51be34c54e41955521f62faa4043b3e

    • SSDEEP

      12288:z/W72HKq+w07BTQoPo+N+E5cvR9joSr+IottPbYCYFp:ClqB07k7E5WR9JzottPb+p

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks