General
-
Target
2acfdef9b437cd45305a4ccf8be77d7098b1cd20c9db64099f3f4ccc66b39def
-
Size
924KB
-
Sample
240108-ad1awahhc2
-
MD5
a376820694ab8850d4bc29143e4dbfb6
-
SHA1
52704dfb831db6619aaf6e99c61e0a90aace6a4b
-
SHA256
2acfdef9b437cd45305a4ccf8be77d7098b1cd20c9db64099f3f4ccc66b39def
-
SHA512
66eb0ef22a045df47707a364a7353a9a092675b6090c0ad746822ab5592f838d56705841f0ce759b6475e9e182cfa19836399fec95a57d568ac858449caee0bd
-
SSDEEP
24576:jfxdTqluSyOB6L29/DPyCJg747zXTmvKeAoknoxp8:jJuySpP3/XT6Kqknoxy
Static task
static1
Behavioral task
behavioral1
Sample
2acfdef9b437cd45305a4ccf8be77d7098b1cd20c9db64099f3f4ccc66b39def.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2acfdef9b437cd45305a4ccf8be77d7098b1cd20c9db64099f3f4ccc66b39def
-
Size
924KB
-
MD5
a376820694ab8850d4bc29143e4dbfb6
-
SHA1
52704dfb831db6619aaf6e99c61e0a90aace6a4b
-
SHA256
2acfdef9b437cd45305a4ccf8be77d7098b1cd20c9db64099f3f4ccc66b39def
-
SHA512
66eb0ef22a045df47707a364a7353a9a092675b6090c0ad746822ab5592f838d56705841f0ce759b6475e9e182cfa19836399fec95a57d568ac858449caee0bd
-
SSDEEP
24576:jfxdTqluSyOB6L29/DPyCJg747zXTmvKeAoknoxp8:jJuySpP3/XT6Kqknoxy
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5