General

  • Target

    0101bda8f97ef29c3997b083ab2d1aba2ea87acea85d83a1faa9049fc661bf7f

  • Size

    120KB

  • Sample

    221123-zzad1seb38

  • MD5

    52daec1acf071524e13951945169efad

  • SHA1

    e37e910f4684783cfffd9e39f19d0a3b96545d54

  • SHA256

    0101bda8f97ef29c3997b083ab2d1aba2ea87acea85d83a1faa9049fc661bf7f

  • SHA512

    7678f514206c4d26836d8b15773a910cc957aeb20faed6674f48692530cedc0ca36bdea64471a875d29af336186ec615e375b898bb6d3b7f9d72d0ee80460af6

  • SSDEEP

    1536:0Lurh19ZtafG7HKb/Z2VJg/4jL+apZsy3C6XWDgFJbSJO7hTX59HXjqXHSvs12Tc:eOZ4f8+ZaJ+YN8yBW2vDHXuCvs1u09f

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      0101bda8f97ef29c3997b083ab2d1aba2ea87acea85d83a1faa9049fc661bf7f

    • Size

      120KB

    • MD5

      52daec1acf071524e13951945169efad

    • SHA1

      e37e910f4684783cfffd9e39f19d0a3b96545d54

    • SHA256

      0101bda8f97ef29c3997b083ab2d1aba2ea87acea85d83a1faa9049fc661bf7f

    • SHA512

      7678f514206c4d26836d8b15773a910cc957aeb20faed6674f48692530cedc0ca36bdea64471a875d29af336186ec615e375b898bb6d3b7f9d72d0ee80460af6

    • SSDEEP

      1536:0Lurh19ZtafG7HKb/Z2VJg/4jL+apZsy3C6XWDgFJbSJO7hTX59HXjqXHSvs12Tc:eOZ4f8+ZaJ+YN8yBW2vDHXuCvs1u09f

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks