General
-
Target
8ece6946a2bbb01e5831e3df8b911017ee79b5ac745f76cca00b0716419718af.exe
-
Size
120KB
-
Sample
240523-1e3eqshe74
-
MD5
953880fad37db41409719b9c694ded20
-
SHA1
2bc3b86241570b790e580168ed88b2ec7f6790d1
-
SHA256
8ece6946a2bbb01e5831e3df8b911017ee79b5ac745f76cca00b0716419718af
-
SHA512
6382642e45d5caa3b25dc4c8a114ca717f8708b0d5446682cc6c47e9402b0060068b52375d038da5db7a3e1a5f28b8eea2e9131726f5310c5b7050d388374ca2
-
SSDEEP
3072:7l8yzmzcfBUEHy+hB7/2NBGqxb0FIG1yofBIW:7ayzmANHyvNBG8xGkLW
Static task
static1
Behavioral task
behavioral1
Sample
8ece6946a2bbb01e5831e3df8b911017ee79b5ac745f76cca00b0716419718af.dll
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8ece6946a2bbb01e5831e3df8b911017ee79b5ac745f76cca00b0716419718af.exe
-
Size
120KB
-
MD5
953880fad37db41409719b9c694ded20
-
SHA1
2bc3b86241570b790e580168ed88b2ec7f6790d1
-
SHA256
8ece6946a2bbb01e5831e3df8b911017ee79b5ac745f76cca00b0716419718af
-
SHA512
6382642e45d5caa3b25dc4c8a114ca717f8708b0d5446682cc6c47e9402b0060068b52375d038da5db7a3e1a5f28b8eea2e9131726f5310c5b7050d388374ca2
-
SSDEEP
3072:7l8yzmzcfBUEHy+hB7/2NBGqxb0FIG1yofBIW:7ayzmANHyvNBG8xGkLW
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5