General
-
Target
774d05f3837d034f08ed33cc4260724c8d929b747d6392613ff9a2096de746f7
-
Size
65KB
-
Sample
240725-29q6ma1eqp
-
MD5
112954bcff40d3f5b80ebe4efd7a93cd
-
SHA1
ae5d5cee954da9396f220b13e01641b641169f2c
-
SHA256
774d05f3837d034f08ed33cc4260724c8d929b747d6392613ff9a2096de746f7
-
SHA512
b23d287060b98d3dc18e7a7f375132810a69ee26935f9d86a26bbfe9a15def52ae372a6c65eb6762f251cf32ab55bd736b520ce9bc5efe003ae849c6243e29b5
-
SSDEEP
1536:18vqsnWV8Df3PXsqHbnkW7xG5sdg0utbaWgqHlz7AnlxqnyDZccGsrRee:18ij8D3F51QslulbgwFAlx88B1
Static task
static1
Behavioral task
behavioral1
Sample
774d05f3837d034f08ed33cc4260724c8d929b747d6392613ff9a2096de746f7.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
774d05f3837d034f08ed33cc4260724c8d929b747d6392613ff9a2096de746f7
-
Size
65KB
-
MD5
112954bcff40d3f5b80ebe4efd7a93cd
-
SHA1
ae5d5cee954da9396f220b13e01641b641169f2c
-
SHA256
774d05f3837d034f08ed33cc4260724c8d929b747d6392613ff9a2096de746f7
-
SHA512
b23d287060b98d3dc18e7a7f375132810a69ee26935f9d86a26bbfe9a15def52ae372a6c65eb6762f251cf32ab55bd736b520ce9bc5efe003ae849c6243e29b5
-
SSDEEP
1536:18vqsnWV8Df3PXsqHbnkW7xG5sdg0utbaWgqHlz7AnlxqnyDZccGsrRee:18ij8D3F51QslulbgwFAlx88B1
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5