General

  • Target

    c0aec6626057c95de825567a2b4babaa7dbd9bcfcc1b24d93209fc4e4aa78fc8

  • Size

    423KB

  • Sample

    221123-z25ypshd9w

  • MD5

    98eda106f5e82ad59d32da3d0d3ea16c

  • SHA1

    99fe9d679cc7eff5053719ba807f8ea46ca809c6

  • SHA256

    c0aec6626057c95de825567a2b4babaa7dbd9bcfcc1b24d93209fc4e4aa78fc8

  • SHA512

    ec7ca74a518dfcf783e632cbb9ccb396fe2a6e65a2d87e95c62864f29ad2b357a285e029986a266ccd6d6341ed632df71eb4c19a42186937b6e3be8830cfd062

  • SSDEEP

    6144:p65Sap7/EflP0+6w0Eick0SsRMw8wEb010BafFQdGVTMdJlFnYmTVcAom5WPav:A5Sa9A6R+Roo10AfFEGVIjYmTiLRCv

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c0aec6626057c95de825567a2b4babaa7dbd9bcfcc1b24d93209fc4e4aa78fc8

    • Size

      423KB

    • MD5

      98eda106f5e82ad59d32da3d0d3ea16c

    • SHA1

      99fe9d679cc7eff5053719ba807f8ea46ca809c6

    • SHA256

      c0aec6626057c95de825567a2b4babaa7dbd9bcfcc1b24d93209fc4e4aa78fc8

    • SHA512

      ec7ca74a518dfcf783e632cbb9ccb396fe2a6e65a2d87e95c62864f29ad2b357a285e029986a266ccd6d6341ed632df71eb4c19a42186937b6e3be8830cfd062

    • SSDEEP

      6144:p65Sap7/EflP0+6w0Eick0SsRMw8wEb010BafFQdGVTMdJlFnYmTVcAom5WPav:A5Sa9A6R+Roo10AfFEGVIjYmTiLRCv

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks