General
-
Target
1f02834d540f2b648be5161882fc07d7
-
Size
120KB
-
Sample
231225-pt98cachbk
-
MD5
1f02834d540f2b648be5161882fc07d7
-
SHA1
5383fa46d5e1d6e2f09bb6b7d92db536f0edf1f0
-
SHA256
33e4cbe1ad998cd53e67475da114980770f6d192e85900669367e0d4f64c23af
-
SHA512
ec498f98c8ebebb82fd8ff939731a3d04295fdfc3131c8e25ac70acd7a25aa97ba62ec9ffd714d4379f2e7bcf445f3a83d56642da36c4b882822ccc162f97fae
-
SSDEEP
1536:/JBfm+CHxc0cc2zRUb8/l08Yd8IV/7ETYEKsf7D6UF3yQeS7Okd6dQziErYeNiup:/+X6Ub8/l0cIVg0G7zZjR7O4eTkmC
Static task
static1
Behavioral task
behavioral1
Sample
1f02834d540f2b648be5161882fc07d7.dll
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1f02834d540f2b648be5161882fc07d7
-
Size
120KB
-
MD5
1f02834d540f2b648be5161882fc07d7
-
SHA1
5383fa46d5e1d6e2f09bb6b7d92db536f0edf1f0
-
SHA256
33e4cbe1ad998cd53e67475da114980770f6d192e85900669367e0d4f64c23af
-
SHA512
ec498f98c8ebebb82fd8ff939731a3d04295fdfc3131c8e25ac70acd7a25aa97ba62ec9ffd714d4379f2e7bcf445f3a83d56642da36c4b882822ccc162f97fae
-
SSDEEP
1536:/JBfm+CHxc0cc2zRUb8/l08Yd8IV/7ETYEKsf7D6UF3yQeS7Okd6dQziErYeNiup:/+X6Ub8/l0cIVg0G7zZjR7O4eTkmC
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5