General
-
Target
03819cd5917849a279104d7bfa1c77e0N.exe
-
Size
120KB
-
Sample
240726-nwad3avhpj
-
MD5
03819cd5917849a279104d7bfa1c77e0
-
SHA1
446d80cb4349807c77672d62d243ff2fd4e07acc
-
SHA256
cd059f478015e9c8bacc9037e8d88fc874b9725fa7ef796d1e72ad96e408ef44
-
SHA512
91c45c095b1d48b6adce72ab98f444cbdd5a4d9a66f760ecfd797ce5d5699e06f4c3e401cd9b8fcc26ee26a4c7e6656af85ff4113df59758b2c08654619a58e8
-
SSDEEP
3072:lVjHXiwUncuPQJIvkPmBVKcIOr30no6/G:lVjUcuPznrcOrEng
Static task
static1
Behavioral task
behavioral1
Sample
03819cd5917849a279104d7bfa1c77e0N.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
03819cd5917849a279104d7bfa1c77e0N.exe
-
Size
120KB
-
MD5
03819cd5917849a279104d7bfa1c77e0
-
SHA1
446d80cb4349807c77672d62d243ff2fd4e07acc
-
SHA256
cd059f478015e9c8bacc9037e8d88fc874b9725fa7ef796d1e72ad96e408ef44
-
SHA512
91c45c095b1d48b6adce72ab98f444cbdd5a4d9a66f760ecfd797ce5d5699e06f4c3e401cd9b8fcc26ee26a4c7e6656af85ff4113df59758b2c08654619a58e8
-
SSDEEP
3072:lVjHXiwUncuPQJIvkPmBVKcIOr30no6/G:lVjUcuPznrcOrEng
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5