General
-
Target
408d1ed8324a69d0df524138ff968f70N.exe
-
Size
65KB
-
Sample
240726-w9lcgszgrf
-
MD5
408d1ed8324a69d0df524138ff968f70
-
SHA1
1239020bbec503ab65fdd06c70a26d15c0dd213f
-
SHA256
a3c9aef35a4f5e86081648697f62f658a2a98cf677b01feeaf079e5180330fb9
-
SHA512
d703c88bedc999ce5bebfa265608e1b5050cea04b38c15c8e3761c878919c872b75dd6ff44f8fad96490d90d3cef03ff751ea2788b4d95a98d659e27b7e5ffbf
-
SSDEEP
1536:LqwnPRBmJvK7QaYUORp+FlnKnS00bU4rpovPsETqdCC2t:LqwPoeBqXaKH1vXT9C2t
Static task
static1
Behavioral task
behavioral1
Sample
408d1ed8324a69d0df524138ff968f70N.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
408d1ed8324a69d0df524138ff968f70N.exe
-
Size
65KB
-
MD5
408d1ed8324a69d0df524138ff968f70
-
SHA1
1239020bbec503ab65fdd06c70a26d15c0dd213f
-
SHA256
a3c9aef35a4f5e86081648697f62f658a2a98cf677b01feeaf079e5180330fb9
-
SHA512
d703c88bedc999ce5bebfa265608e1b5050cea04b38c15c8e3761c878919c872b75dd6ff44f8fad96490d90d3cef03ff751ea2788b4d95a98d659e27b7e5ffbf
-
SSDEEP
1536:LqwnPRBmJvK7QaYUORp+FlnKnS00bU4rpovPsETqdCC2t:LqwPoeBqXaKH1vXT9C2t
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5