General
-
Target
6e3ae52c246a85bc0d17c6abef14e390N.exe
-
Size
120KB
-
Sample
240713-kaawxswblc
-
MD5
6e3ae52c246a85bc0d17c6abef14e390
-
SHA1
e850e924ac2e40a130f4b20d5ab021637ad82932
-
SHA256
dfd7592c2405cf4a21f59fd0810dece4b1658f6bc8f345b3421b8fd5209bd335
-
SHA512
d37004554dfcdc71f4a9c03a8bda2e4e06853f05eb25e17c2f47d4bd3dbd2bda2b969c1f186ed099c0eee8b382029d2fc57252d82ddd452042897a56378ff28f
-
SSDEEP
3072:xaNcxK/34vSpfPiYuG/myrBg+Z3yWlV9XJdY:CcI/SMCpWmmT5y2XJd
Static task
static1
Behavioral task
behavioral1
Sample
6e3ae52c246a85bc0d17c6abef14e390N.dll
Resource
win7-20240705-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6e3ae52c246a85bc0d17c6abef14e390N.exe
-
Size
120KB
-
MD5
6e3ae52c246a85bc0d17c6abef14e390
-
SHA1
e850e924ac2e40a130f4b20d5ab021637ad82932
-
SHA256
dfd7592c2405cf4a21f59fd0810dece4b1658f6bc8f345b3421b8fd5209bd335
-
SHA512
d37004554dfcdc71f4a9c03a8bda2e4e06853f05eb25e17c2f47d4bd3dbd2bda2b969c1f186ed099c0eee8b382029d2fc57252d82ddd452042897a56378ff28f
-
SSDEEP
3072:xaNcxK/34vSpfPiYuG/myrBg+Z3yWlV9XJdY:CcI/SMCpWmmT5y2XJd
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5