General

  • Target

    81bf92beb6a404a37b74a25e62737622d1ee0e4ff7312b2d05015bb81a35d277

  • Size

    65KB

  • Sample

    221204-ljh5bsff39

  • MD5

    722520c86b70883366dbda54424a3fb1

  • SHA1

    028ab786b4ba4718aa5608ffe1b8c4723ba138b7

  • SHA256

    81bf92beb6a404a37b74a25e62737622d1ee0e4ff7312b2d05015bb81a35d277

  • SHA512

    d18937a4a5898d748c92ebd2bdc8d50704051f9c5f04485ca600ee180c8bdc9ab2913a2532e21b1bee125f2046fce3ec775621e7826a1f7c64d211d1880882f0

  • SSDEEP

    1536:BRTHQ3MmvvbyHuqxoDw077G/uiRyrMfcGz5zfbKOoe6HlAvjTU:swZEwwsryrMfr5zWOoe6X

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      81bf92beb6a404a37b74a25e62737622d1ee0e4ff7312b2d05015bb81a35d277

    • Size

      65KB

    • MD5

      722520c86b70883366dbda54424a3fb1

    • SHA1

      028ab786b4ba4718aa5608ffe1b8c4723ba138b7

    • SHA256

      81bf92beb6a404a37b74a25e62737622d1ee0e4ff7312b2d05015bb81a35d277

    • SHA512

      d18937a4a5898d748c92ebd2bdc8d50704051f9c5f04485ca600ee180c8bdc9ab2913a2532e21b1bee125f2046fce3ec775621e7826a1f7c64d211d1880882f0

    • SSDEEP

      1536:BRTHQ3MmvvbyHuqxoDw077G/uiRyrMfcGz5zfbKOoe6HlAvjTU:swZEwwsryrMfr5zWOoe6X

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks