General

  • Target

    abfa143ea7b4c0e31aa4bfa20d5d4552c37aba9beeac7557fef1b64688be6275

  • Size

    788KB

  • Sample

    221123-z3rsgaed55

  • MD5

    44ace0cf96f00d2ea3b605fa106ad5a1

  • SHA1

    b1666fb251b5d32d3997859c87560ffdf04bc671

  • SHA256

    abfa143ea7b4c0e31aa4bfa20d5d4552c37aba9beeac7557fef1b64688be6275

  • SHA512

    8d6a59fa59b99ce372958e33d88ce5ab6adbc8e111d413e3d718be729122e2a28936fb75f814b04bb6290869c5bb98ca685156eb7fab1cc22b324500d6f8a3f1

  • SSDEEP

    12288:hgkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUYBXK4kbu:RxsKXa+hHyWseBgxBXjOu

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      abfa143ea7b4c0e31aa4bfa20d5d4552c37aba9beeac7557fef1b64688be6275

    • Size

      788KB

    • MD5

      44ace0cf96f00d2ea3b605fa106ad5a1

    • SHA1

      b1666fb251b5d32d3997859c87560ffdf04bc671

    • SHA256

      abfa143ea7b4c0e31aa4bfa20d5d4552c37aba9beeac7557fef1b64688be6275

    • SHA512

      8d6a59fa59b99ce372958e33d88ce5ab6adbc8e111d413e3d718be729122e2a28936fb75f814b04bb6290869c5bb98ca685156eb7fab1cc22b324500d6f8a3f1

    • SSDEEP

      12288:hgkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUYBXK4kbu:RxsKXa+hHyWseBgxBXjOu

    • Modifies WinLogon for persistence

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Adds policy Run key to start application

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks