General

  • Target

    b0e1c689a1efd24efb4432775af42468bd3a28e0a1e27a6dea220306164c4f85

  • Size

    1.1MB

  • Sample

    221129-hfwpgahc7v

  • MD5

    2fca30b0367b6dcb5869a46e7504dced

  • SHA1

    64a9463bb32dd1632534e526219936f8a6e2be21

  • SHA256

    b0e1c689a1efd24efb4432775af42468bd3a28e0a1e27a6dea220306164c4f85

  • SHA512

    05850bb7d6115f841e72cc6b9dfefda09f4215ff3c22ddf19badef1b754cd922a0aa39977516cca9432387732b8a2d469430da5863efe12525080fef8941a885

  • SSDEEP

    12288:xJtRZSgKgKLKRKoVqRTxiK/fObT/bGipnJDXGGzFOcHGT07xJFrjRHirtdED3oNT:xdZS5AfvHQcJFrjRY6QsAbFonIeQ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      b0e1c689a1efd24efb4432775af42468bd3a28e0a1e27a6dea220306164c4f85

    • Size

      1.1MB

    • MD5

      2fca30b0367b6dcb5869a46e7504dced

    • SHA1

      64a9463bb32dd1632534e526219936f8a6e2be21

    • SHA256

      b0e1c689a1efd24efb4432775af42468bd3a28e0a1e27a6dea220306164c4f85

    • SHA512

      05850bb7d6115f841e72cc6b9dfefda09f4215ff3c22ddf19badef1b754cd922a0aa39977516cca9432387732b8a2d469430da5863efe12525080fef8941a885

    • SSDEEP

      12288:xJtRZSgKgKLKRKoVqRTxiK/fObT/bGipnJDXGGzFOcHGT07xJFrjRHirtdED3oNT:xdZS5AfvHQcJFrjRY6QsAbFonIeQ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks