General

  • Target

    fff0eebd709d0dbde03729ab3cc4bb34b2d3f29a40b816392ffeda21f2d57744

  • Size

    95KB

  • Sample

    221126-cl89vshb8x

  • MD5

    627d4706e7ee8c51a52cd9d5d3c1e90a

  • SHA1

    8539a6a496c5999373dadd6f70b19a2e0347a541

  • SHA256

    fff0eebd709d0dbde03729ab3cc4bb34b2d3f29a40b816392ffeda21f2d57744

  • SHA512

    2f5b4bf3d74dbfdad6ab08bf67ba8b69d4c05785cc99421e6512cc0537109768136b942437127795ed843e6c4b3e8f36c8ab77dd9fac6b4ce744f676ef51ca34

  • SSDEEP

    1536:LZ/nEkh8OTKNzQwKJo25eyv2elRNky0JmU9VqQ/HhTD2JYUQZryrL8Ae/bBZjtaH:txhTKNzMJVteyR+TJmsBlD2TQaLk/jta

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      fff0eebd709d0dbde03729ab3cc4bb34b2d3f29a40b816392ffeda21f2d57744

    • Size

      95KB

    • MD5

      627d4706e7ee8c51a52cd9d5d3c1e90a

    • SHA1

      8539a6a496c5999373dadd6f70b19a2e0347a541

    • SHA256

      fff0eebd709d0dbde03729ab3cc4bb34b2d3f29a40b816392ffeda21f2d57744

    • SHA512

      2f5b4bf3d74dbfdad6ab08bf67ba8b69d4c05785cc99421e6512cc0537109768136b942437127795ed843e6c4b3e8f36c8ab77dd9fac6b4ce744f676ef51ca34

    • SSDEEP

      1536:LZ/nEkh8OTKNzQwKJo25eyv2elRNky0JmU9VqQ/HhTD2JYUQZryrL8Ae/bBZjtaH:txhTKNzMJVteyR+TJmsBlD2TQaLk/jta

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks