General

  • Target

    d9069dd9381b06fc4060b158594269b06bf42e3d3bb0f14b5a548da59f345ab7

  • Size

    355KB

  • Sample

    221123-w5952sdh73

  • MD5

    5c298d642aed1d88d6e2c7f873233fd0

  • SHA1

    d29f2ac370ff3e64189daf80c242bbbde1d53146

  • SHA256

    d9069dd9381b06fc4060b158594269b06bf42e3d3bb0f14b5a548da59f345ab7

  • SHA512

    697da1c299805bfd4ecc307c04f2a62ff40ef2ab3e12dbace9a869298d179abfeb3eb7188cd75dcf757b866ecf909ad16540357bf7d21934e866172d41378171

  • SSDEEP

    3072:G856+Aq4WBT5TjbyfQ5d2ap3BES3l+3p7z8p5+cyIqrKMjE3g2AJX5ex4Iyj0bOI:p56+Aq4WBTWpSqXhpeeioU2UBxwBEN

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      d9069dd9381b06fc4060b158594269b06bf42e3d3bb0f14b5a548da59f345ab7

    • Size

      355KB

    • MD5

      5c298d642aed1d88d6e2c7f873233fd0

    • SHA1

      d29f2ac370ff3e64189daf80c242bbbde1d53146

    • SHA256

      d9069dd9381b06fc4060b158594269b06bf42e3d3bb0f14b5a548da59f345ab7

    • SHA512

      697da1c299805bfd4ecc307c04f2a62ff40ef2ab3e12dbace9a869298d179abfeb3eb7188cd75dcf757b866ecf909ad16540357bf7d21934e866172d41378171

    • SSDEEP

      3072:G856+Aq4WBT5TjbyfQ5d2ap3BES3l+3p7z8p5+cyIqrKMjE3g2AJX5ex4Iyj0bOI:p56+Aq4WBTWpSqXhpeeioU2UBxwBEN

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks