General

  • Target

    6e9ca53f2618147f6512fab112027c5f

  • Size

    152KB

  • Sample

    231226-pn91dscfb4

  • MD5

    6e9ca53f2618147f6512fab112027c5f

  • SHA1

    bd2908d96845ee2463fbdea2e1ce0ca4eb0f3c17

  • SHA256

    163a639cfa3669488861a6a52abf2d24a6379c8e11b578ab33448644d5e01719

  • SHA512

    70511f215f198abc67c9aaedb5d58b4436c604e3571edaf68e154823e4969e7b0b6cd422a7dd34d2744ef142cc55358df80d2d902b00ee60f2899440ea32addb

  • SSDEEP

    3072:Zxz2vVFit3XbwpmPuxVEgOXOVPdQxQf7C4RXqMrAdyFnI/2/uf1LX:ZC/ij2xVEgOeFdQafOVMOyFI/2WJ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      6e9ca53f2618147f6512fab112027c5f

    • Size

      152KB

    • MD5

      6e9ca53f2618147f6512fab112027c5f

    • SHA1

      bd2908d96845ee2463fbdea2e1ce0ca4eb0f3c17

    • SHA256

      163a639cfa3669488861a6a52abf2d24a6379c8e11b578ab33448644d5e01719

    • SHA512

      70511f215f198abc67c9aaedb5d58b4436c604e3571edaf68e154823e4969e7b0b6cd422a7dd34d2744ef142cc55358df80d2d902b00ee60f2899440ea32addb

    • SSDEEP

      3072:Zxz2vVFit3XbwpmPuxVEgOXOVPdQxQf7C4RXqMrAdyFnI/2/uf1LX:ZC/ij2xVEgOeFdQafOVMOyFI/2WJ

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks