General

  • Target

    b3ad348f5406a35e072a3990f4f00e4dedf7be17ac775a595f3e986a052383fa

  • Size

    912KB

  • Sample

    221204-bwhn8aed98

  • MD5

    06c7c802c483f51f703768e8a5dc1c75

  • SHA1

    1b5f80a6b01ba0cb0cfd8af00ed86cc36ef5562d

  • SHA256

    b3ad348f5406a35e072a3990f4f00e4dedf7be17ac775a595f3e986a052383fa

  • SHA512

    f195d4793c227b67a888456e5948f074cd445e984a79db411762de9fb26972e0eb645ff0f7a3766aaa4dc289ab7c5d254bbf0789a8103e5456a9ab4926954041

  • SSDEEP

    24576:u/7mQ8iQRycu8AShYkTo0mvgWql/TOe5P1NeNlQWixtY6hUQC:uTmDrYkhygll/ieN1NeDoQ6hUf

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      b3ad348f5406a35e072a3990f4f00e4dedf7be17ac775a595f3e986a052383fa

    • Size

      912KB

    • MD5

      06c7c802c483f51f703768e8a5dc1c75

    • SHA1

      1b5f80a6b01ba0cb0cfd8af00ed86cc36ef5562d

    • SHA256

      b3ad348f5406a35e072a3990f4f00e4dedf7be17ac775a595f3e986a052383fa

    • SHA512

      f195d4793c227b67a888456e5948f074cd445e984a79db411762de9fb26972e0eb645ff0f7a3766aaa4dc289ab7c5d254bbf0789a8103e5456a9ab4926954041

    • SSDEEP

      24576:u/7mQ8iQRycu8AShYkTo0mvgWql/TOe5P1NeNlQWixtY6hUQC:uTmDrYkhygll/ieN1NeDoQ6hUf

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Registers COM server for autorun

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks