General
-
Target
58474b181f62bfa2d7070684ab7dce397c3f95a20d35d24d501d1a641c49177d
-
Size
9.6MB
-
Sample
240221-lk9zfadg2w
-
MD5
a48a9ca405c329ceeebbeed44c4df341
-
SHA1
9a451c8b255de8191e8ba52af71f6af2da86f14b
-
SHA256
58474b181f62bfa2d7070684ab7dce397c3f95a20d35d24d501d1a641c49177d
-
SHA512
50d05bbbae24819d8144f8ab7b751c072ffdf72b600dd486644c4dffac08566116e29f9de7dd7f4b0aa6b57fe56b5147d20bfe37c02f103ea951fb167c75d8b5
-
SSDEEP
196608:sWIHKtE+3uWvprwpJmT687bAYvMxH2BIQ4ylUJ/8+Up3Z:sGF3DM/mO8nAYvo2CQ4ylUapp
Static task
static1
Behavioral task
behavioral1
Sample
58474b181f62bfa2d7070684ab7dce397c3f95a20d35d24d501d1a641c49177d.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
58474b181f62bfa2d7070684ab7dce397c3f95a20d35d24d501d1a641c49177d
-
Size
9.6MB
-
MD5
a48a9ca405c329ceeebbeed44c4df341
-
SHA1
9a451c8b255de8191e8ba52af71f6af2da86f14b
-
SHA256
58474b181f62bfa2d7070684ab7dce397c3f95a20d35d24d501d1a641c49177d
-
SHA512
50d05bbbae24819d8144f8ab7b751c072ffdf72b600dd486644c4dffac08566116e29f9de7dd7f4b0aa6b57fe56b5147d20bfe37c02f103ea951fb167c75d8b5
-
SSDEEP
196608:sWIHKtE+3uWvprwpJmT687bAYvMxH2BIQ4ylUJ/8+Up3Z:sGF3DM/mO8nAYvo2CQ4ylUapp
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5