General

  • Target

    f00b3b946b76a1a65ee81f61750dd4fc0c1a7942366b87b6e648d697cca9ed50

  • Size

    2.5MB

  • Sample

    241206-em7hrsvnal

  • MD5

    3fe35986acefc2919cac43e24c2aebd0

  • SHA1

    c6dbde77283308e8f0601fc95bf0f5c452e13b9e

  • SHA256

    f00b3b946b76a1a65ee81f61750dd4fc0c1a7942366b87b6e648d697cca9ed50

  • SHA512

    54a55cf7f8ec16b3605499201e73adb92ed809fd549f599ccd8799a386cedb3b8f8d40523e09b0875a802539b0410684cd99daa37a2fecffc96fa2f309499282

  • SSDEEP

    49152:7KiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTBqJ:UrZ23AbsK6Ro022JjL2WEiVqJZB2

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Targets

    • Target

      f00b3b946b76a1a65ee81f61750dd4fc0c1a7942366b87b6e648d697cca9ed50

    • Size

      2.5MB

    • MD5

      3fe35986acefc2919cac43e24c2aebd0

    • SHA1

      c6dbde77283308e8f0601fc95bf0f5c452e13b9e

    • SHA256

      f00b3b946b76a1a65ee81f61750dd4fc0c1a7942366b87b6e648d697cca9ed50

    • SHA512

      54a55cf7f8ec16b3605499201e73adb92ed809fd549f599ccd8799a386cedb3b8f8d40523e09b0875a802539b0410684cd99daa37a2fecffc96fa2f309499282

    • SSDEEP

      49152:7KiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTBqJ:UrZ23AbsK6Ro022JjL2WEiVqJZB2

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks