General

  • Target

    06f101c377c9a2e864eaf8cbbeed61266431f123c2cd32ff776ce930ee67765c

  • Size

    200KB

  • Sample

    221127-x661fsgf6t

  • MD5

    7f974af964596b305c20113ed530c024

  • SHA1

    808067aa8bd460f41413ea8d74d36fdcdabb015a

  • SHA256

    06f101c377c9a2e864eaf8cbbeed61266431f123c2cd32ff776ce930ee67765c

  • SHA512

    fca9795be2f74c17d68dfe99356b52493d009e9e6901389adfed1b4421dab4bb38d1d425694b3e6bce811311c2bb5c340a18b4bbda94d4ec854eed793cdafdc3

  • SSDEEP

    6144:C4o1sUtqp1HQ9Fs8SsseAT+MAgyPKW99U2vzQpZ:ZoWUAv6FtkeATbAgJL

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      06f101c377c9a2e864eaf8cbbeed61266431f123c2cd32ff776ce930ee67765c

    • Size

      200KB

    • MD5

      7f974af964596b305c20113ed530c024

    • SHA1

      808067aa8bd460f41413ea8d74d36fdcdabb015a

    • SHA256

      06f101c377c9a2e864eaf8cbbeed61266431f123c2cd32ff776ce930ee67765c

    • SHA512

      fca9795be2f74c17d68dfe99356b52493d009e9e6901389adfed1b4421dab4bb38d1d425694b3e6bce811311c2bb5c340a18b4bbda94d4ec854eed793cdafdc3

    • SSDEEP

      6144:C4o1sUtqp1HQ9Fs8SsseAT+MAgyPKW99U2vzQpZ:ZoWUAv6FtkeATbAgJL

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks