General

  • Target

    afd039a92422207e61202c6f0a43d9e9859cafdf0f89957816e83446ad9f9c87

  • Size

    136KB

  • Sample

    221205-p5214sfc6w

  • MD5

    4173e4cea21fee440c9b53d3d7aebfb3

  • SHA1

    62f857dd7c0b48d00cfa22a0d0d1988f15469533

  • SHA256

    afd039a92422207e61202c6f0a43d9e9859cafdf0f89957816e83446ad9f9c87

  • SHA512

    4860805868b6284cd3d290d694d8fde394d59eedeaec5ab204717aaa238ddbc806a2e3922d10389ad557d4f85df8aff1908a5f3bb0404b522f55fc08b9fb0669

  • SSDEEP

    3072:ymbvhHSKYgqs7kATp3F89MdSlc9oj/Jh7yz:ym7hCgnTVdSl//XQ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      afd039a92422207e61202c6f0a43d9e9859cafdf0f89957816e83446ad9f9c87

    • Size

      136KB

    • MD5

      4173e4cea21fee440c9b53d3d7aebfb3

    • SHA1

      62f857dd7c0b48d00cfa22a0d0d1988f15469533

    • SHA256

      afd039a92422207e61202c6f0a43d9e9859cafdf0f89957816e83446ad9f9c87

    • SHA512

      4860805868b6284cd3d290d694d8fde394d59eedeaec5ab204717aaa238ddbc806a2e3922d10389ad557d4f85df8aff1908a5f3bb0404b522f55fc08b9fb0669

    • SSDEEP

      3072:ymbvhHSKYgqs7kATp3F89MdSlc9oj/Jh7yz:ym7hCgnTVdSl//XQ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks