General

  • Target

    c26b41b07be050659f3a8cfafdfabbd294c1ab1a4a9e6a69039ba3f056692a8d

  • Size

    229KB

  • Sample

    221205-p27gesfa2v

  • MD5

    64d8edb61c7eb720ea42e57dffbd9f72

  • SHA1

    79e634302637d1801af0acea355fa0b91c4dc2f0

  • SHA256

    c26b41b07be050659f3a8cfafdfabbd294c1ab1a4a9e6a69039ba3f056692a8d

  • SHA512

    c0ba065f1bdbab51ac188db1153c40998b7e9fed471921f8d9f176ec2d962250093989a3453e49073fa751dd8b388bddcbebe77e94d368ec522f7e9e5d841a33

  • SSDEEP

    3072:dA4QkwFtd+WceJPZpqE8fFGYH1q8HmuUlq86sjEE2j7uIHRQ1R2bcO6fyoa:HQhcexqE8fFHJUQEg7RHRQ1k65a

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      c26b41b07be050659f3a8cfafdfabbd294c1ab1a4a9e6a69039ba3f056692a8d

    • Size

      229KB

    • MD5

      64d8edb61c7eb720ea42e57dffbd9f72

    • SHA1

      79e634302637d1801af0acea355fa0b91c4dc2f0

    • SHA256

      c26b41b07be050659f3a8cfafdfabbd294c1ab1a4a9e6a69039ba3f056692a8d

    • SHA512

      c0ba065f1bdbab51ac188db1153c40998b7e9fed471921f8d9f176ec2d962250093989a3453e49073fa751dd8b388bddcbebe77e94d368ec522f7e9e5d841a33

    • SSDEEP

      3072:dA4QkwFtd+WceJPZpqE8fFGYH1q8HmuUlq86sjEE2j7uIHRQ1R2bcO6fyoa:HQhcexqE8fFHJUQEg7RHRQ1k65a

    • Modifies visibility of file extensions in Explorer

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v6

Tasks