General

  • Target

    ed01bb0a46bc07625089841e89ebb7f970aeff99871c0ab0a66e2dba685d9e4e

  • Size

    272KB

  • Sample

    221128-xx84fsab47

  • MD5

    22d6a714a4e7d8bf29084faeedec3100

  • SHA1

    71c62e771f57c30448600aa41a113d5b7afbf14b

  • SHA256

    ed01bb0a46bc07625089841e89ebb7f970aeff99871c0ab0a66e2dba685d9e4e

  • SHA512

    5de32283ed70291cc11af6815802ed13c43a7f0ca96b1999510c8980607478822b94c9d7473474d19b8cb9cc1e04b4e5ac1bde4c528ff3adb27094f9bf25173c

  • SSDEEP

    3072:wVeXVCaNpcEU+mzihKh8wpzDqulR3X9sDpLg6ZGKIXeYnVlDvAVA7Y4DzCE4gYTM:wVeiiEV82llbs1g6+XbVdAdOC8gAKK

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      ed01bb0a46bc07625089841e89ebb7f970aeff99871c0ab0a66e2dba685d9e4e

    • Size

      272KB

    • MD5

      22d6a714a4e7d8bf29084faeedec3100

    • SHA1

      71c62e771f57c30448600aa41a113d5b7afbf14b

    • SHA256

      ed01bb0a46bc07625089841e89ebb7f970aeff99871c0ab0a66e2dba685d9e4e

    • SHA512

      5de32283ed70291cc11af6815802ed13c43a7f0ca96b1999510c8980607478822b94c9d7473474d19b8cb9cc1e04b4e5ac1bde4c528ff3adb27094f9bf25173c

    • SSDEEP

      3072:wVeXVCaNpcEU+mzihKh8wpzDqulR3X9sDpLg6ZGKIXeYnVlDvAVA7Y4DzCE4gYTM:wVeiiEV82llbs1g6+XbVdAdOC8gAKK

    • Modifies visiblity of hidden/system files in Explorer

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

6
T1112

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks