General

  • Target

    58474b181f62bfa2d7070684ab7dce397c3f95a20d35d24d501d1a641c49177d

  • Size

    9.6MB

  • Sample

    240221-lk9zfadg2w

  • MD5

    a48a9ca405c329ceeebbeed44c4df341

  • SHA1

    9a451c8b255de8191e8ba52af71f6af2da86f14b

  • SHA256

    58474b181f62bfa2d7070684ab7dce397c3f95a20d35d24d501d1a641c49177d

  • SHA512

    50d05bbbae24819d8144f8ab7b751c072ffdf72b600dd486644c4dffac08566116e29f9de7dd7f4b0aa6b57fe56b5147d20bfe37c02f103ea951fb167c75d8b5

  • SSDEEP

    196608:sWIHKtE+3uWvprwpJmT687bAYvMxH2BIQ4ylUJ/8+Up3Z:sGF3DM/mO8nAYvo2CQ4ylUapp

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      58474b181f62bfa2d7070684ab7dce397c3f95a20d35d24d501d1a641c49177d

    • Size

      9.6MB

    • MD5

      a48a9ca405c329ceeebbeed44c4df341

    • SHA1

      9a451c8b255de8191e8ba52af71f6af2da86f14b

    • SHA256

      58474b181f62bfa2d7070684ab7dce397c3f95a20d35d24d501d1a641c49177d

    • SHA512

      50d05bbbae24819d8144f8ab7b751c072ffdf72b600dd486644c4dffac08566116e29f9de7dd7f4b0aa6b57fe56b5147d20bfe37c02f103ea951fb167c75d8b5

    • SSDEEP

      196608:sWIHKtE+3uWvprwpJmT687bAYvMxH2BIQ4ylUJ/8+Up3Z:sGF3DM/mO8nAYvo2CQ4ylUapp

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks