General
-
Target
e7e4f9b338f634e9818ab8ccb1a12e30N.exe
-
Size
120KB
-
Sample
240813-wh8cyasfnj
-
MD5
e7e4f9b338f634e9818ab8ccb1a12e30
-
SHA1
e6e0402f372aca08e7fa6552c3e4bebad361f161
-
SHA256
5b2867a6400555f776c50def66004cf71857d35cb3b4d0371f20c2898ba6c68a
-
SHA512
6c4225af7beca3fccb3ec90a6d179836517c8c438c6bae977fb6069d86892b963247db279ef25d7cd32e9d483c3f8ca76d8a79dfcfbc892df3ba84ad44413635
-
SSDEEP
3072:pd34at33rkhErWdQXyTyEdQ5RDaO1PHPUzB:Doa17eEi5wlHPO
Static task
static1
Behavioral task
behavioral1
Sample
e7e4f9b338f634e9818ab8ccb1a12e30N.dll
Resource
win7-20240705-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e7e4f9b338f634e9818ab8ccb1a12e30N.exe
-
Size
120KB
-
MD5
e7e4f9b338f634e9818ab8ccb1a12e30
-
SHA1
e6e0402f372aca08e7fa6552c3e4bebad361f161
-
SHA256
5b2867a6400555f776c50def66004cf71857d35cb3b4d0371f20c2898ba6c68a
-
SHA512
6c4225af7beca3fccb3ec90a6d179836517c8c438c6bae977fb6069d86892b963247db279ef25d7cd32e9d483c3f8ca76d8a79dfcfbc892df3ba84ad44413635
-
SSDEEP
3072:pd34at33rkhErWdQXyTyEdQ5RDaO1PHPUzB:Doa17eEi5wlHPO
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5