General

  • Target

    8c76ecbe30370fb5243132d663ca4e57a5840cdc533cd7d7ace2c9e29044be22

  • Size

    1.2MB

  • Sample

    221123-z23tcaec99

  • MD5

    8856d1013030cec1e4d098426e7518b2

  • SHA1

    d7b406531ec2062ca0a420af3c5211acb16a8c17

  • SHA256

    8c76ecbe30370fb5243132d663ca4e57a5840cdc533cd7d7ace2c9e29044be22

  • SHA512

    6f68777bdce003c56c4839644471263bac35bb61136cf2640b4741d2e99a241834cadce2d09fcb18c1a11917cc2fcdcff22b9a5dd40472a0f291dfbf470a0f50

  • SSDEEP

    24576:7hKR8dU5kwakDzMQ4lav3scRQbKouG7uQZcnZ4u0ZRjSPukz:nHTtQ4M/sqquzCRjS2y

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      8c76ecbe30370fb5243132d663ca4e57a5840cdc533cd7d7ace2c9e29044be22

    • Size

      1.2MB

    • MD5

      8856d1013030cec1e4d098426e7518b2

    • SHA1

      d7b406531ec2062ca0a420af3c5211acb16a8c17

    • SHA256

      8c76ecbe30370fb5243132d663ca4e57a5840cdc533cd7d7ace2c9e29044be22

    • SHA512

      6f68777bdce003c56c4839644471263bac35bb61136cf2640b4741d2e99a241834cadce2d09fcb18c1a11917cc2fcdcff22b9a5dd40472a0f291dfbf470a0f50

    • SSDEEP

      24576:7hKR8dU5kwakDzMQ4lav3scRQbKouG7uQZcnZ4u0ZRjSPukz:nHTtQ4M/sqquzCRjS2y

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks