General
-
Target
881d3f10ec8570a583ab2ce4775fa620N.exe
-
Size
120KB
-
Sample
240821-bl7wcswglq
-
MD5
881d3f10ec8570a583ab2ce4775fa620
-
SHA1
708862fd7da2d2cda4b7f2b102a61b60e5242fbc
-
SHA256
dd3ef7e26ccc521c32c715a022fd809070c32667dc49dbc24578a5fd511c0f0b
-
SHA512
1467d6640c0b7c3018d0ad3997c363cbf16380a1b3a339a26974efe3c848e7060ba7f451156ccf6aade78804bf453826cc9871f3c433618428da962cbf775402
-
SSDEEP
1536:+lwW1TXsuTQOLUdpqXkxS577ZhWw3p8hO1DtI6zZEu2DkhoKHznhhJZ6WXkj9hnB:+yW1I24dcSwdRahmI6SuKTMFhmWXAH
Static task
static1
Behavioral task
behavioral1
Sample
881d3f10ec8570a583ab2ce4775fa620N.dll
Resource
win7-20240704-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
881d3f10ec8570a583ab2ce4775fa620N.exe
-
Size
120KB
-
MD5
881d3f10ec8570a583ab2ce4775fa620
-
SHA1
708862fd7da2d2cda4b7f2b102a61b60e5242fbc
-
SHA256
dd3ef7e26ccc521c32c715a022fd809070c32667dc49dbc24578a5fd511c0f0b
-
SHA512
1467d6640c0b7c3018d0ad3997c363cbf16380a1b3a339a26974efe3c848e7060ba7f451156ccf6aade78804bf453826cc9871f3c433618428da962cbf775402
-
SSDEEP
1536:+lwW1TXsuTQOLUdpqXkxS577ZhWw3p8hO1DtI6zZEu2DkhoKHznhhJZ6WXkj9hnB:+yW1I24dcSwdRahmI6SuKTMFhmWXAH
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5