General
-
Target
bc6025de6b223efa2deb32a16215c840N.exe
-
Size
120KB
-
Sample
240821-wa1m5asaqh
-
MD5
bc6025de6b223efa2deb32a16215c840
-
SHA1
9d69d45a8afe119b5d8b83a8bb9aef96166b59d8
-
SHA256
9597542566c6172b9c7adb4ca6227c85b59648c67ef4d4e8baabf7a8e42733d5
-
SHA512
de813c03044e9adda26b0d14e9c8f5b160da5c5cc870f84a0407ff2b470b5a4dd96191ef49669b785059ca2b3d62a38fb1c06d66eae8cc729a0b39eb4ea60c2e
-
SSDEEP
1536:yohYwT2c8bX1VDrJk/bn3tCHuufKaM8/MgS1prYAk/HPwLAwsqVa:fJ1gX7DU3tCHumKaM8/Mpdqw0aa
Static task
static1
Behavioral task
behavioral1
Sample
bc6025de6b223efa2deb32a16215c840N.dll
Resource
win7-20240705-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
bc6025de6b223efa2deb32a16215c840N.exe
-
Size
120KB
-
MD5
bc6025de6b223efa2deb32a16215c840
-
SHA1
9d69d45a8afe119b5d8b83a8bb9aef96166b59d8
-
SHA256
9597542566c6172b9c7adb4ca6227c85b59648c67ef4d4e8baabf7a8e42733d5
-
SHA512
de813c03044e9adda26b0d14e9c8f5b160da5c5cc870f84a0407ff2b470b5a4dd96191ef49669b785059ca2b3d62a38fb1c06d66eae8cc729a0b39eb4ea60c2e
-
SSDEEP
1536:yohYwT2c8bX1VDrJk/bn3tCHuufKaM8/MgS1prYAk/HPwLAwsqVa:fJ1gX7DU3tCHumKaM8/Mpdqw0aa
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5