General

  • Target

    193c912f6dd6be09c3030bfc102bfe509181e02ccc59a38d4358712f4affe966

  • Size

    356KB

  • Sample

    221205-1zav8aef2w

  • MD5

    73deaa02a442a58e190e810722835f4f

  • SHA1

    feedf067912cd7f7259b5aef7343427e079bf966

  • SHA256

    193c912f6dd6be09c3030bfc102bfe509181e02ccc59a38d4358712f4affe966

  • SHA512

    9be75cf27adcd5c7b7e8f90c67d1c26fa491d31ab5b7116cfbf3f8e291266a08c628b5e46d111774ea1204342055787d5582b6f70a47cce62ebb8e0a45de8291

  • SSDEEP

    6144:ETnjnvrM3mjHGh5Doh9Z5cAea4Jv81E6eiqgq8WfV5vP1:EHn438Hwerea2vEEriXq8WfV

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      193c912f6dd6be09c3030bfc102bfe509181e02ccc59a38d4358712f4affe966

    • Size

      356KB

    • MD5

      73deaa02a442a58e190e810722835f4f

    • SHA1

      feedf067912cd7f7259b5aef7343427e079bf966

    • SHA256

      193c912f6dd6be09c3030bfc102bfe509181e02ccc59a38d4358712f4affe966

    • SHA512

      9be75cf27adcd5c7b7e8f90c67d1c26fa491d31ab5b7116cfbf3f8e291266a08c628b5e46d111774ea1204342055787d5582b6f70a47cce62ebb8e0a45de8291

    • SSDEEP

      6144:ETnjnvrM3mjHGh5Doh9Z5cAea4Jv81E6eiqgq8WfV5vP1:EHn438Hwerea2vEEriXq8WfV

    • Modifies WinLogon for persistence

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks