General

  • Target

    0238204114f44c60bba88d7b9e3586efb8b89c0bfcaef47e9cc3a93437117d4e

  • Size

    1.9MB

  • Sample

    221127-wlbs5sga66

  • MD5

    7ba5eca384fc1a1cfe38cb4874abcdde

  • SHA1

    252ef724dfa798e5d7ef047380581c84de46a1ac

  • SHA256

    0238204114f44c60bba88d7b9e3586efb8b89c0bfcaef47e9cc3a93437117d4e

  • SHA512

    9f4231b0f658ac25436444eb227b640f22e3c91809f3aea953926b24716831efde99eb7ac458e373e15f74f695d182c1c4f9c8c59f1087321e5dc8d700e1e15a

  • SSDEEP

    49152:yNgNcjOKqGZA5wVvzsu6ipNEhf3uyS2YSesgtsoYe7:DNT7T+FEhf3u5ygGe7

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      0238204114f44c60bba88d7b9e3586efb8b89c0bfcaef47e9cc3a93437117d4e

    • Size

      1.9MB

    • MD5

      7ba5eca384fc1a1cfe38cb4874abcdde

    • SHA1

      252ef724dfa798e5d7ef047380581c84de46a1ac

    • SHA256

      0238204114f44c60bba88d7b9e3586efb8b89c0bfcaef47e9cc3a93437117d4e

    • SHA512

      9f4231b0f658ac25436444eb227b640f22e3c91809f3aea953926b24716831efde99eb7ac458e373e15f74f695d182c1c4f9c8c59f1087321e5dc8d700e1e15a

    • SSDEEP

      49152:yNgNcjOKqGZA5wVvzsu6ipNEhf3uyS2YSesgtsoYe7:DNT7T+FEhf3u5ygGe7

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

7
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks