General

  • Target

    bb95b6ee18d74f5eda175fa61512e3a13c0ba939e401fbd9e84752214836df52

  • Size

    120KB

  • Sample

    221203-aeeessbe4v

  • MD5

    9a2f4b951b70a2904a1a65fa1f5b7259

  • SHA1

    d245ffbe38699c15dc4a08ce8cfbee7256d8df27

  • SHA256

    bb95b6ee18d74f5eda175fa61512e3a13c0ba939e401fbd9e84752214836df52

  • SHA512

    1e8123b92cb4754ccc1661770c8578e8398278dd4f7dcaa21806d19f4bb844dae394ceb62d3f9c36a6c536a8d603a9872e7074c5da70b5f37ab0fff01246b0c8

  • SSDEEP

    1536:5cXH1d+woy3X7Hik7Q1Y1Zv8RmcP6OH3zJcHYMLz6TuH/AuDfHHfbdj2:5cXLucb7Yov8wqKY466BXbdy

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      bb95b6ee18d74f5eda175fa61512e3a13c0ba939e401fbd9e84752214836df52

    • Size

      120KB

    • MD5

      9a2f4b951b70a2904a1a65fa1f5b7259

    • SHA1

      d245ffbe38699c15dc4a08ce8cfbee7256d8df27

    • SHA256

      bb95b6ee18d74f5eda175fa61512e3a13c0ba939e401fbd9e84752214836df52

    • SHA512

      1e8123b92cb4754ccc1661770c8578e8398278dd4f7dcaa21806d19f4bb844dae394ceb62d3f9c36a6c536a8d603a9872e7074c5da70b5f37ab0fff01246b0c8

    • SSDEEP

      1536:5cXH1d+woy3X7Hik7Q1Y1Zv8RmcP6OH3zJcHYMLz6TuH/AuDfHHfbdj2:5cXLucb7Yov8wqKY466BXbdy

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks