General

  • Target

    44742dc9b06576217af5d4dc917255d9ec37c055c3d963bdbb3cdd271a6d13b6.exe

  • Size

    194KB

  • Sample

    241217-1h6xbsynbz

  • MD5

    cbef71ba0c95027638262563e27ab26f

  • SHA1

    f7be8b529c16d8d6fa07238473a3eaddee6b8a23

  • SHA256

    44742dc9b06576217af5d4dc917255d9ec37c055c3d963bdbb3cdd271a6d13b6

  • SHA512

    8aac073741dc052e5857bcc9e243a926db742e73b27f575073f4e651648267fe120f233e463fd68d2363c1783dd0b48137189d61de05a7c2f5ce51496bb49efe

  • SSDEEP

    6144:iNSDyDIkFthpNTeF9sQKprqd9tEOdVv9HZHZ0S8Piec:KSDyTFtjdc9sQapOT9Hf0zPiec

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

http://klkjwre77638dfqwieuoi888.info/

Targets

    • Target

      44742dc9b06576217af5d4dc917255d9ec37c055c3d963bdbb3cdd271a6d13b6.exe

    • Size

      194KB

    • MD5

      cbef71ba0c95027638262563e27ab26f

    • SHA1

      f7be8b529c16d8d6fa07238473a3eaddee6b8a23

    • SHA256

      44742dc9b06576217af5d4dc917255d9ec37c055c3d963bdbb3cdd271a6d13b6

    • SHA512

      8aac073741dc052e5857bcc9e243a926db742e73b27f575073f4e651648267fe120f233e463fd68d2363c1783dd0b48137189d61de05a7c2f5ce51496bb49efe

    • SSDEEP

      6144:iNSDyDIkFthpNTeF9sQKprqd9tEOdVv9HZHZ0S8Piec:KSDyTFtjdc9sQapOT9Hf0zPiec

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Windows security modification

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks