General

  • Target

    27ea0112d89e4028fa081358cc75e6db23947211110419f7e9c0a5027cbae8bc

  • Size

    649KB

  • Sample

    241122-j49fxaxkg1

  • MD5

    3bed3645edf3dc24726353f6dde4993a

  • SHA1

    90436cdc53c4319dc24490de14b2fad91905d282

  • SHA256

    27ea0112d89e4028fa081358cc75e6db23947211110419f7e9c0a5027cbae8bc

  • SHA512

    cfd0f9a14df9c62f647e59f71aebfe4046389418044895fcf1a2244bd458aaed9df1262a1163c14405fa50bbb342ec48c1f852dde7fe5c80cc8b85991026880f

  • SSDEEP

    12288:89hQqoui8o4+KfHMUoKp+HRNwMi3h0PVh5R888888888888W88888888888Bl/BM:Ajourn+KfHMGizS0PVrBVG

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      27ea0112d89e4028fa081358cc75e6db23947211110419f7e9c0a5027cbae8bc

    • Size

      649KB

    • MD5

      3bed3645edf3dc24726353f6dde4993a

    • SHA1

      90436cdc53c4319dc24490de14b2fad91905d282

    • SHA256

      27ea0112d89e4028fa081358cc75e6db23947211110419f7e9c0a5027cbae8bc

    • SHA512

      cfd0f9a14df9c62f647e59f71aebfe4046389418044895fcf1a2244bd458aaed9df1262a1163c14405fa50bbb342ec48c1f852dde7fe5c80cc8b85991026880f

    • SSDEEP

      12288:89hQqoui8o4+KfHMUoKp+HRNwMi3h0PVh5R888888888888W88888888888Bl/BM:Ajourn+KfHMGizS0PVrBVG

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Windows security modification

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks