General
-
Target
7e5708e0c9d102f0fcd551ed25bf1813c3b3a4aea321d48d224f7bd0401e413e
-
Size
1.4MB
-
Sample
240529-tm2d3sca85
-
MD5
348e78e919f6ed502f39c0f4fea6973a
-
SHA1
779a6b69ba189cddadd274aa2b28cef2f4d4a719
-
SHA256
7e5708e0c9d102f0fcd551ed25bf1813c3b3a4aea321d48d224f7bd0401e413e
-
SHA512
8816246b6b817c29b7a4d500e33c5698ffdc1daaf0f4f0c49823c37193a6d02fbcf99287576526d804d9af50b0acc1ab295be6396bc862a850fb6ed3f899ef7d
-
SSDEEP
24576:1E4IuY1tnsa4mCOMuFrK09bhLDoyYEn6n63twWxCinyGuQdTl9k:mjDsa4rEFrLZloVr63t6inyGug8
Static task
static1
Behavioral task
behavioral1
Sample
7e5708e0c9d102f0fcd551ed25bf1813c3b3a4aea321d48d224f7bd0401e413e.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7e5708e0c9d102f0fcd551ed25bf1813c3b3a4aea321d48d224f7bd0401e413e
-
Size
1.4MB
-
MD5
348e78e919f6ed502f39c0f4fea6973a
-
SHA1
779a6b69ba189cddadd274aa2b28cef2f4d4a719
-
SHA256
7e5708e0c9d102f0fcd551ed25bf1813c3b3a4aea321d48d224f7bd0401e413e
-
SHA512
8816246b6b817c29b7a4d500e33c5698ffdc1daaf0f4f0c49823c37193a6d02fbcf99287576526d804d9af50b0acc1ab295be6396bc862a850fb6ed3f899ef7d
-
SSDEEP
24576:1E4IuY1tnsa4mCOMuFrK09bhLDoyYEn6n63twWxCinyGuQdTl9k:mjDsa4rEFrLZloVr63t6inyGug8
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5