General

  • Target

    b5309cd7df791cdaaa027468fa3015e3a265a05042a3058dfc51ece09ca68c47

  • Size

    2.1MB

  • Sample

    240504-tqlsssah4w

  • MD5

    83a809870cd39b3dea33b71ac3a72dd1

  • SHA1

    9762c4d5627bf923847296a8ffd96ffc244b8ea8

  • SHA256

    b5309cd7df791cdaaa027468fa3015e3a265a05042a3058dfc51ece09ca68c47

  • SHA512

    2850feef2a4cd17ac9ce15d62112af20fd062e4761acb53ae06b3a5d048ada1132f4174593a811d4c5708f9b35c984ba1a019aaa9e804d2fe350107572e8c44d

  • SSDEEP

    49152:qFR+/ZlC9NomzdklIcKpeMekC9Dv2VmA0q7NLcPAAlj8nNB:qb+/ZlQNoEO2cKpZeF9D2Kq7NLi

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      b5309cd7df791cdaaa027468fa3015e3a265a05042a3058dfc51ece09ca68c47

    • Size

      2.1MB

    • MD5

      83a809870cd39b3dea33b71ac3a72dd1

    • SHA1

      9762c4d5627bf923847296a8ffd96ffc244b8ea8

    • SHA256

      b5309cd7df791cdaaa027468fa3015e3a265a05042a3058dfc51ece09ca68c47

    • SHA512

      2850feef2a4cd17ac9ce15d62112af20fd062e4761acb53ae06b3a5d048ada1132f4174593a811d4c5708f9b35c984ba1a019aaa9e804d2fe350107572e8c44d

    • SSDEEP

      49152:qFR+/ZlC9NomzdklIcKpeMekC9Dv2VmA0q7NLcPAAlj8nNB:qb+/ZlQNoEO2cKpZeF9D2Kq7NLi

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • UAC bypass

    • Windows security bypass

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks