General

  • Target

    be84f3da82dd5b4c98190dd6ed385249e4ed0cb8677a1ea3431117e53a088741

  • Size

    2.7MB

  • Sample

    241122-g42d7awjax

  • MD5

    8e51c978abded8eaee60231ba36a0128

  • SHA1

    3e0074a9169bcc00a87cb2f609638f1386de6ddb

  • SHA256

    be84f3da82dd5b4c98190dd6ed385249e4ed0cb8677a1ea3431117e53a088741

  • SHA512

    84aff1d90f98d19b6441c58fee607fa751037771d5125dd97eb61d6162138b51fed77be493db9867b720706b707da186a8894060bf39b5e99cf5a366ce80932d

  • SSDEEP

    49152:QppRz7GLyYf4jTHgjs1RY4IG7jETwFheYOCQV4HNsmZTSjXjRJQvUCb:Qpnz7G2YfCA4C4IG7jETweYOCQVSsmoC

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      be84f3da82dd5b4c98190dd6ed385249e4ed0cb8677a1ea3431117e53a088741

    • Size

      2.7MB

    • MD5

      8e51c978abded8eaee60231ba36a0128

    • SHA1

      3e0074a9169bcc00a87cb2f609638f1386de6ddb

    • SHA256

      be84f3da82dd5b4c98190dd6ed385249e4ed0cb8677a1ea3431117e53a088741

    • SHA512

      84aff1d90f98d19b6441c58fee607fa751037771d5125dd97eb61d6162138b51fed77be493db9867b720706b707da186a8894060bf39b5e99cf5a366ce80932d

    • SSDEEP

      49152:QppRz7GLyYf4jTHgjs1RY4IG7jETwFheYOCQV4HNsmZTSjXjRJQvUCb:Qpnz7G2YfCA4C4IG7jETweYOCQVSsmoC

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Windows security modification

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks