General
-
Target
f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067
-
Size
567KB
-
Sample
240721-gpcghsxckp
-
MD5
c00c2c86cac8aec9dc53d73e6addf621
-
SHA1
c1d177cb32b1beb3a09827d59541c19fc473ce65
-
SHA256
f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067
-
SHA512
caef8e4d387d4912103e523b184c0b9b823b5658877a02de52fc944fb30ca22c8681b00bb2e6b23b8513b9e1f52df2ae83dcde41607d89855ef67539e37b7ab9
-
SSDEEP
6144:wFpbFpXFpgT2Jst3mWmqLuFpguM2cT65Qv4sdZfUmkjYtK3Qxahx:Wpxp1pwsWUpRh5u4ccm8++x
Static task
static1
Behavioral task
behavioral1
Sample
f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067.exe
Resource
win7-20240704-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067
-
Size
567KB
-
MD5
c00c2c86cac8aec9dc53d73e6addf621
-
SHA1
c1d177cb32b1beb3a09827d59541c19fc473ce65
-
SHA256
f5c99dc1fee7b2280907a7ec42f0e5e039212f1bfc687740c04cec1e1cc91067
-
SHA512
caef8e4d387d4912103e523b184c0b9b823b5658877a02de52fc944fb30ca22c8681b00bb2e6b23b8513b9e1f52df2ae83dcde41607d89855ef67539e37b7ab9
-
SSDEEP
6144:wFpbFpXFpgT2Jst3mWmqLuFpguM2cT65Qv4sdZfUmkjYtK3Qxahx:Wpxp1pwsWUpRh5u4ccm8++x
-
Modifies firewall policy service
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5