General
-
Target
107422e5c55c5ea4ad321cacdab0f66d
-
Size
790KB
-
Sample
231230-gltlmaahg8
-
MD5
107422e5c55c5ea4ad321cacdab0f66d
-
SHA1
ed7b84a5f2c0dd080c3f0aef2052df2e70b31b06
-
SHA256
47c1e29d75f0b3fc798031fe4914cd9ab14e777b58c75385584c66e8055ba5a2
-
SHA512
4e3c39f96d4e9799f8e1d5f529af95ecafdc28bad4009de34bc31f4350320a7043a1ca3c46c9781d7ff04b436dce96facdeaa1fdd85be5bc16bc455fb87f0877
-
SSDEEP
24576:hjrlQOKtsccKww+BR78W+mb8pL/zRj4zgsy/ZbFdMghJ3:JB9nJBBB8pLlj4zgR/JP
Static task
static1
Behavioral task
behavioral1
Sample
107422e5c55c5ea4ad321cacdab0f66d.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
107422e5c55c5ea4ad321cacdab0f66d
-
Size
790KB
-
MD5
107422e5c55c5ea4ad321cacdab0f66d
-
SHA1
ed7b84a5f2c0dd080c3f0aef2052df2e70b31b06
-
SHA256
47c1e29d75f0b3fc798031fe4914cd9ab14e777b58c75385584c66e8055ba5a2
-
SHA512
4e3c39f96d4e9799f8e1d5f529af95ecafdc28bad4009de34bc31f4350320a7043a1ca3c46c9781d7ff04b436dce96facdeaa1fdd85be5bc16bc455fb87f0877
-
SSDEEP
24576:hjrlQOKtsccKww+BR78W+mb8pL/zRj4zgsy/ZbFdMghJ3:JB9nJBBB8pLlj4zgR/JP
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5