General
-
Target
5eab4bbb8de72134358532026f4b835ff292d726d0901f52fcc35731f61b3c98
-
Size
3.2MB
-
Sample
240417-ywmphada52
-
MD5
70cd8573ba2da33c7ff1ab3905737298
-
SHA1
f2749c28bb0a9f0b96c51e2dc4b40558a56ec42d
-
SHA256
5eab4bbb8de72134358532026f4b835ff292d726d0901f52fcc35731f61b3c98
-
SHA512
672ace5761dba55c9d2b9511412e69098a58d57f4e4ac7f864e31eeed71f7bb71505cc06d46828f3a56666fbce988f7a5b34641c1e13080f81795e0e1b4aa097
-
SSDEEP
49152:1NdDGViZaH7/p+Slo8+56LaShsyIWxmSUPlo0DRZh/ZTCd333WjWf:fBGViCwdux3UPlo0VZpA333H
Static task
static1
Behavioral task
behavioral1
Sample
5eab4bbb8de72134358532026f4b835ff292d726d0901f52fcc35731f61b3c98.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
5eab4bbb8de72134358532026f4b835ff292d726d0901f52fcc35731f61b3c98
-
Size
3.2MB
-
MD5
70cd8573ba2da33c7ff1ab3905737298
-
SHA1
f2749c28bb0a9f0b96c51e2dc4b40558a56ec42d
-
SHA256
5eab4bbb8de72134358532026f4b835ff292d726d0901f52fcc35731f61b3c98
-
SHA512
672ace5761dba55c9d2b9511412e69098a58d57f4e4ac7f864e31eeed71f7bb71505cc06d46828f3a56666fbce988f7a5b34641c1e13080f81795e0e1b4aa097
-
SSDEEP
49152:1NdDGViZaH7/p+Slo8+56LaShsyIWxmSUPlo0DRZh/ZTCd333WjWf:fBGViCwdux3UPlo0VZpA333H
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5