General
-
Target
c1478329d6393ffbdcc14cd5d1aafba0bc99c5be406b6f6386d26bf81a0f0726
-
Size
1.8MB
-
Sample
240609-d5s8esda8w
-
MD5
b2bd3f5b99a0b66b773baf2f18f252b7
-
SHA1
a6f0de6800201991da6646bbc16de5d57cff3981
-
SHA256
c1478329d6393ffbdcc14cd5d1aafba0bc99c5be406b6f6386d26bf81a0f0726
-
SHA512
046cb8805946ddc676eb53dfd17d724d0172b22921829614454b8207aab20391a67d083ad32bcfe429b4367c68205dc155ac50ea30c01d6b06973fb906757b05
-
SSDEEP
49152:kZT5CInmYNCx9Y6XUTUGC/Tz8EE/Tz8ELQv9QbIsk+v/gC:OdCInmYNCx9YMGCn8EEn8E6Q8sv
Static task
static1
Behavioral task
behavioral1
Sample
c1478329d6393ffbdcc14cd5d1aafba0bc99c5be406b6f6386d26bf81a0f0726.exe
Resource
win7-20240220-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c1478329d6393ffbdcc14cd5d1aafba0bc99c5be406b6f6386d26bf81a0f0726
-
Size
1.8MB
-
MD5
b2bd3f5b99a0b66b773baf2f18f252b7
-
SHA1
a6f0de6800201991da6646bbc16de5d57cff3981
-
SHA256
c1478329d6393ffbdcc14cd5d1aafba0bc99c5be406b6f6386d26bf81a0f0726
-
SHA512
046cb8805946ddc676eb53dfd17d724d0172b22921829614454b8207aab20391a67d083ad32bcfe429b4367c68205dc155ac50ea30c01d6b06973fb906757b05
-
SSDEEP
49152:kZT5CInmYNCx9Y6XUTUGC/Tz8EE/Tz8ELQv9QbIsk+v/gC:OdCInmYNCx9YMGCn8EEn8E6Q8sv
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3