General

  • Target

    97e40f696f17fb0f3b60245f2e74bf50c82f424eadc93bd6bc228c41834a9c5d

  • Size

    97KB

  • Sample

    221205-zxkrzafh28

  • MD5

    0ba32e3a782fb50cf1ef614e80eefcfa

  • SHA1

    0abcf16289829439880e257ef70d2b471f2bd7d2

  • SHA256

    97e40f696f17fb0f3b60245f2e74bf50c82f424eadc93bd6bc228c41834a9c5d

  • SHA512

    e9d9d62f7cf5fd4510dc08633613df974206f469ca486d6b7bfa09a7db59d4437f77570de4e713b1aaad5d0ed3d5d7810e30327a8836e618cda745d64f9510cd

  • SSDEEP

    1536:9AcQ6g9KgrCPZyaNtwd1eAK6GeXgUEdIWztOSzMmOGdYOl4GSH9hD:5La/rCPZyaNtw/Y8heIWzsS4Z61yD

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      97e40f696f17fb0f3b60245f2e74bf50c82f424eadc93bd6bc228c41834a9c5d

    • Size

      97KB

    • MD5

      0ba32e3a782fb50cf1ef614e80eefcfa

    • SHA1

      0abcf16289829439880e257ef70d2b471f2bd7d2

    • SHA256

      97e40f696f17fb0f3b60245f2e74bf50c82f424eadc93bd6bc228c41834a9c5d

    • SHA512

      e9d9d62f7cf5fd4510dc08633613df974206f469ca486d6b7bfa09a7db59d4437f77570de4e713b1aaad5d0ed3d5d7810e30327a8836e618cda745d64f9510cd

    • SSDEEP

      1536:9AcQ6g9KgrCPZyaNtwd1eAK6GeXgUEdIWztOSzMmOGdYOl4GSH9hD:5La/rCPZyaNtw/Y8heIWzsS4Z61yD

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks