General

  • Target

    ced3da74164136f7c0954c650a0c99e7eb34f361afa491464c4b0fadc3f87ae9

  • Size

    100KB

  • Sample

    221205-p1b9wsbc87

  • MD5

    690b0c9dea7093ef855807d69cb8ea84

  • SHA1

    c7f104740e62a16cec6739144929fca596e29f7e

  • SHA256

    ced3da74164136f7c0954c650a0c99e7eb34f361afa491464c4b0fadc3f87ae9

  • SHA512

    af8454c095b73d193ac2219d404b2945f2bd66c715556c5cb74152f69172832b4c728e926f53e6089ee0dccef6694e6c5bc2142380b5808bb321441dc9e66631

  • SSDEEP

    3072:PYLUlID+7VvUbc9sPPzm/H0/7non+s7BX:PYolIDEVsbc9CsH0/7mr

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      ced3da74164136f7c0954c650a0c99e7eb34f361afa491464c4b0fadc3f87ae9

    • Size

      100KB

    • MD5

      690b0c9dea7093ef855807d69cb8ea84

    • SHA1

      c7f104740e62a16cec6739144929fca596e29f7e

    • SHA256

      ced3da74164136f7c0954c650a0c99e7eb34f361afa491464c4b0fadc3f87ae9

    • SHA512

      af8454c095b73d193ac2219d404b2945f2bd66c715556c5cb74152f69172832b4c728e926f53e6089ee0dccef6694e6c5bc2142380b5808bb321441dc9e66631

    • SSDEEP

      3072:PYLUlID+7VvUbc9sPPzm/H0/7non+s7BX:PYolIDEVsbc9CsH0/7mr

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.