General

  • Target

    5c13c8665237ce1d5864ba644f8dbb9755d6e936ead6386d2f815d6312bc6858

  • Size

    65KB

  • Sample

    240424-t2dassdc71

  • MD5

    07a98ea2c5eafae5d2f31261a0a2a2eb

  • SHA1

    a7eec28343f66755f1f6518a3436d3489c3a70e6

  • SHA256

    5c13c8665237ce1d5864ba644f8dbb9755d6e936ead6386d2f815d6312bc6858

  • SHA512

    e6962c43f93408a1336e27fb1c705b058a4abf8a4f7f9821ab3d390b9f94397d091283338f1aae1df657d90d15e9f74d55c7ca9d2f862be034343dfda867da30

  • SSDEEP

    1536:2KtQ2tXQsf0zaKCYE0igDWg7lqGCyOIXkuCnn:pa2ptfKCYIBG5RCnn

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      5c13c8665237ce1d5864ba644f8dbb9755d6e936ead6386d2f815d6312bc6858

    • Size

      65KB

    • MD5

      07a98ea2c5eafae5d2f31261a0a2a2eb

    • SHA1

      a7eec28343f66755f1f6518a3436d3489c3a70e6

    • SHA256

      5c13c8665237ce1d5864ba644f8dbb9755d6e936ead6386d2f815d6312bc6858

    • SHA512

      e6962c43f93408a1336e27fb1c705b058a4abf8a4f7f9821ab3d390b9f94397d091283338f1aae1df657d90d15e9f74d55c7ca9d2f862be034343dfda867da30

    • SSDEEP

      1536:2KtQ2tXQsf0zaKCYE0igDWg7lqGCyOIXkuCnn:pa2ptfKCYIBG5RCnn

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Defense Evasion

Modify Registry

5
T1112

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks