General

  • Target

    a5638f46f92c86e000212631269541bc91331ccf5f3fe40ee0a5c95714cc859e

  • Size

    1.1MB

  • Sample

    221123-z1afeaeb93

  • MD5

    d75185cf153e8a5256769ca08d3dc74e

  • SHA1

    9fede015769c62fe1278a5b5e77ca1edc1ac91af

  • SHA256

    a5638f46f92c86e000212631269541bc91331ccf5f3fe40ee0a5c95714cc859e

  • SHA512

    97cf1a7548cadf1337edb00087141f8b3348a0e83a60db86666068d8096f42a314c99a3f605a18fb3b5a95bcfd7b375b1990e2fce7df2d9f0be88e6102f78b2d

  • SSDEEP

    24576:QjLmmEPVF1rpZyShMTB+5nabmkziwyRTpZnTPe:QjLmztpNG4BapiwyrRTPe

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      a5638f46f92c86e000212631269541bc91331ccf5f3fe40ee0a5c95714cc859e

    • Size

      1.1MB

    • MD5

      d75185cf153e8a5256769ca08d3dc74e

    • SHA1

      9fede015769c62fe1278a5b5e77ca1edc1ac91af

    • SHA256

      a5638f46f92c86e000212631269541bc91331ccf5f3fe40ee0a5c95714cc859e

    • SHA512

      97cf1a7548cadf1337edb00087141f8b3348a0e83a60db86666068d8096f42a314c99a3f605a18fb3b5a95bcfd7b375b1990e2fce7df2d9f0be88e6102f78b2d

    • SSDEEP

      24576:QjLmmEPVF1rpZyShMTB+5nabmkziwyRTpZnTPe:QjLmztpNG4BapiwyrRTPe

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks