General
-
Target
148b5e93b6867756c918c35dce92db20N.exe
-
Size
120KB
-
Sample
240726-qx9aws1crr
-
MD5
148b5e93b6867756c918c35dce92db20
-
SHA1
d75098980f16931fbd3da8fe5d1ec198a08da6c5
-
SHA256
2c7ffdbf98061a90a4bacaed5aec79e6d50809f9539d36780125c78e51751312
-
SHA512
ce7c61bb86dc2257a6e08aae03da5cac28fd6a19ab609d7feaa3585b20ab2509e1ae9e4373f3219a398e4938778a5236b6ae356c806018c5e7b8ac00ce1a4c82
-
SSDEEP
3072:JM9Q4p12AzYSXXWOATUmyCUQKI7oa9be:i9luI7ATryZS
Static task
static1
Behavioral task
behavioral1
Sample
148b5e93b6867756c918c35dce92db20N.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
148b5e93b6867756c918c35dce92db20N.exe
-
Size
120KB
-
MD5
148b5e93b6867756c918c35dce92db20
-
SHA1
d75098980f16931fbd3da8fe5d1ec198a08da6c5
-
SHA256
2c7ffdbf98061a90a4bacaed5aec79e6d50809f9539d36780125c78e51751312
-
SHA512
ce7c61bb86dc2257a6e08aae03da5cac28fd6a19ab609d7feaa3585b20ab2509e1ae9e4373f3219a398e4938778a5236b6ae356c806018c5e7b8ac00ce1a4c82
-
SSDEEP
3072:JM9Q4p12AzYSXXWOATUmyCUQKI7oa9be:i9luI7ATryZS
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5