General

  • Target

    afe67d743cf63f58c58381f1658505d46843e1f862e739f46aa38a51e9da9d04

  • Size

    376KB

  • Sample

    221205-k4zgdaea79

  • MD5

    a51b333cd1c3732d70a2ae9952bedbb3

  • SHA1

    c909aaea4b290d31174f6de966f7ba0a7e35723f

  • SHA256

    afe67d743cf63f58c58381f1658505d46843e1f862e739f46aa38a51e9da9d04

  • SHA512

    f5971bf0d07722c11bdc7a1de13c158099eeec20e07616c51377e22dd285f78359c3d8bdd81b7f17b6a29a7fd3e3d17fe1de56083e8d49cc0916dbb58f1804e4

  • SSDEEP

    3072:mdR4JyBwFwtuBKWpRgjVDf2uTHtSv3TfS:md6JFwXwRwou7gjfS

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      afe67d743cf63f58c58381f1658505d46843e1f862e739f46aa38a51e9da9d04

    • Size

      376KB

    • MD5

      a51b333cd1c3732d70a2ae9952bedbb3

    • SHA1

      c909aaea4b290d31174f6de966f7ba0a7e35723f

    • SHA256

      afe67d743cf63f58c58381f1658505d46843e1f862e739f46aa38a51e9da9d04

    • SHA512

      f5971bf0d07722c11bdc7a1de13c158099eeec20e07616c51377e22dd285f78359c3d8bdd81b7f17b6a29a7fd3e3d17fe1de56083e8d49cc0916dbb58f1804e4

    • SSDEEP

      3072:mdR4JyBwFwtuBKWpRgjVDf2uTHtSv3TfS:md6JFwXwRwou7gjfS

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks