General

  • Target

    0b43de17b191c6bbdada7cdc175cc3f9c9937de7b5aa7bc26887017e682bdebe

  • Size

    77KB

  • Sample

    221127-xbdqesea2s

  • MD5

    1feb7d6c4e3f1cffdafb8456ee09f0bb

  • SHA1

    8b624a479c63cc9749fcadb42f3149e872500249

  • SHA256

    0b43de17b191c6bbdada7cdc175cc3f9c9937de7b5aa7bc26887017e682bdebe

  • SHA512

    d242540a07a9841084555ae776da07f9a8725af5f17b693b0fdbed3e6a27b5588d8ffb8c6e21354ea354e2d9c6026b21505e556e8a0fd4daca0f8386760f68a2

  • SSDEEP

    1536:NXlP2/Q+b0IhVOHKQwaX2M0tD89O8U1ldCOjSWgYN6ndlasTd8:N1P2/1HLTaX2loOVTISS5YNgdlaCu

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      0b43de17b191c6bbdada7cdc175cc3f9c9937de7b5aa7bc26887017e682bdebe

    • Size

      77KB

    • MD5

      1feb7d6c4e3f1cffdafb8456ee09f0bb

    • SHA1

      8b624a479c63cc9749fcadb42f3149e872500249

    • SHA256

      0b43de17b191c6bbdada7cdc175cc3f9c9937de7b5aa7bc26887017e682bdebe

    • SHA512

      d242540a07a9841084555ae776da07f9a8725af5f17b693b0fdbed3e6a27b5588d8ffb8c6e21354ea354e2d9c6026b21505e556e8a0fd4daca0f8386760f68a2

    • SSDEEP

      1536:NXlP2/Q+b0IhVOHKQwaX2M0tD89O8U1ldCOjSWgYN6ndlasTd8:N1P2/1HLTaX2loOVTISS5YNgdlaCu

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks