General

  • Target

    5b06f9eeea254d0b4f1077e89775a1853f94aa918edc0d5bd5b5f99512ab469e

  • Size

    1.7MB

  • Sample

    221127-xgtzlaee3z

  • MD5

    fa36f464100a56ab53f0c67253bfb761

  • SHA1

    7f80097e5aa3fc5e77e8b36f27f0c525727c971b

  • SHA256

    5b06f9eeea254d0b4f1077e89775a1853f94aa918edc0d5bd5b5f99512ab469e

  • SHA512

    e0812d6a57a283d01898a8ebc30ad1893228ad49019d93313fa3da1e5b986015a622b7094f599ee04073731b6fcb367cfac90e936ce4328cc8d261ffd41b88f1

  • SSDEEP

    49152:eLkqdDZqCgICMSO3DDVnPuZm+pSqrYXs+DKtaf:eLLVZqCgIChSDVPSm+MO4Dnf

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      5b06f9eeea254d0b4f1077e89775a1853f94aa918edc0d5bd5b5f99512ab469e

    • Size

      1.7MB

    • MD5

      fa36f464100a56ab53f0c67253bfb761

    • SHA1

      7f80097e5aa3fc5e77e8b36f27f0c525727c971b

    • SHA256

      5b06f9eeea254d0b4f1077e89775a1853f94aa918edc0d5bd5b5f99512ab469e

    • SHA512

      e0812d6a57a283d01898a8ebc30ad1893228ad49019d93313fa3da1e5b986015a622b7094f599ee04073731b6fcb367cfac90e936ce4328cc8d261ffd41b88f1

    • SSDEEP

      49152:eLkqdDZqCgICMSO3DDVnPuZm+pSqrYXs+DKtaf:eLLVZqCgIChSDVPSm+MO4Dnf

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Drops file in Drivers directory

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

System Information Discovery

2
T1082

Tasks