General
-
Target
051ee83bd3128d790befa2b3fd9bd980N.exe
-
Size
65KB
-
Sample
240727-1j3ajazflm
-
MD5
051ee83bd3128d790befa2b3fd9bd980
-
SHA1
23a626ec7e2a32d16162be65194113ba6539355b
-
SHA256
91aab5428cc3ecf4246e78810844d3bf78dc10dac75e33ecd731af7fadfec6a0
-
SHA512
32ee02ef2605594e02aff2612f88727631f00d81b1da6cdc853ac50bd887d538b3fc40b770152f915e597261b1b93ea2d74e8106ce440cc539e26d83f3b51eca
-
SSDEEP
1536:xfRmIdRMqGiUzjpRXZEbpVHRdqSk7kbQzZLxxsQoa1mb651EaAfNZ:x53aiUnpxKbpVxwSWkmZNeQo6ef3
Static task
static1
Behavioral task
behavioral1
Sample
051ee83bd3128d790befa2b3fd9bd980N.exe
Resource
win7-20240705-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
051ee83bd3128d790befa2b3fd9bd980N.exe
-
Size
65KB
-
MD5
051ee83bd3128d790befa2b3fd9bd980
-
SHA1
23a626ec7e2a32d16162be65194113ba6539355b
-
SHA256
91aab5428cc3ecf4246e78810844d3bf78dc10dac75e33ecd731af7fadfec6a0
-
SHA512
32ee02ef2605594e02aff2612f88727631f00d81b1da6cdc853ac50bd887d538b3fc40b770152f915e597261b1b93ea2d74e8106ce440cc539e26d83f3b51eca
-
SSDEEP
1536:xfRmIdRMqGiUzjpRXZEbpVHRdqSk7kbQzZLxxsQoa1mb651EaAfNZ:x53aiUnpxKbpVxwSWkmZNeQo6ef3
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5