General

  • Target

    4c63f2ae6871683102422bf455a3fa56df75059d3128a6c5aa16d662fd6a711b

  • Size

    208KB

  • Sample

    221123-vl7edacc71

  • MD5

    3498d2a4f60006bbc559f8904592ece7

  • SHA1

    17b37f4e366443bc51d98f6add537e576219145e

  • SHA256

    4c63f2ae6871683102422bf455a3fa56df75059d3128a6c5aa16d662fd6a711b

  • SHA512

    f773fee2f0fa7921e7c91cd9218a9c402f86f49d7fe5e353c440c99abf0413c3b2d09c47fa48b8ff131d6cb404c91380cfc6e90527b5845bf3a37f40a164a5b2

  • SSDEEP

    3072:ZNuWi6oqmDtL+qvFuhjpGbpV4kHs2vhgj2gRX1he0yXRHNzc9h/y6:zuDEjVRHmM9hn

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      4c63f2ae6871683102422bf455a3fa56df75059d3128a6c5aa16d662fd6a711b

    • Size

      208KB

    • MD5

      3498d2a4f60006bbc559f8904592ece7

    • SHA1

      17b37f4e366443bc51d98f6add537e576219145e

    • SHA256

      4c63f2ae6871683102422bf455a3fa56df75059d3128a6c5aa16d662fd6a711b

    • SHA512

      f773fee2f0fa7921e7c91cd9218a9c402f86f49d7fe5e353c440c99abf0413c3b2d09c47fa48b8ff131d6cb404c91380cfc6e90527b5845bf3a37f40a164a5b2

    • SSDEEP

      3072:ZNuWi6oqmDtL+qvFuhjpGbpV4kHs2vhgj2gRX1he0yXRHNzc9h/y6:zuDEjVRHmM9hn

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks