General

  • Target

    67c7934c1dadd2e4f1c93eff65ddac7e0b6c186137183e97df16a0b48e2e3d5d

  • Size

    65KB

  • Sample

    221125-ydzaksdf9w

  • MD5

    c4a89e3131dea866a59188b6a12b73a9

  • SHA1

    7b1a34ca376dbd48230e7447374cab8de12fb67e

  • SHA256

    67c7934c1dadd2e4f1c93eff65ddac7e0b6c186137183e97df16a0b48e2e3d5d

  • SHA512

    be7dc4c9760a735b7f87f0c45f4ecb68265a0541498ddd175cbdbaa4e605c9e55130ac04fe378adf55625205f70f10aecfb174ca0fcd56c7b8ed83231bad1799

  • SSDEEP

    1536:oqGs9/iwsE7N2Xc6P0ZdfhmiXDCMnxZMGqSl53j0N1L6FIpxnCPP:oqGsxiZymc6PEdfw0CMnxt3j0HL6FIpY

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      67c7934c1dadd2e4f1c93eff65ddac7e0b6c186137183e97df16a0b48e2e3d5d

    • Size

      65KB

    • MD5

      c4a89e3131dea866a59188b6a12b73a9

    • SHA1

      7b1a34ca376dbd48230e7447374cab8de12fb67e

    • SHA256

      67c7934c1dadd2e4f1c93eff65ddac7e0b6c186137183e97df16a0b48e2e3d5d

    • SHA512

      be7dc4c9760a735b7f87f0c45f4ecb68265a0541498ddd175cbdbaa4e605c9e55130ac04fe378adf55625205f70f10aecfb174ca0fcd56c7b8ed83231bad1799

    • SSDEEP

      1536:oqGs9/iwsE7N2Xc6P0ZdfhmiXDCMnxZMGqSl53j0N1L6FIpxnCPP:oqGsxiZymc6PEdfw0CMnxt3j0HL6FIpY

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks