General
-
Target
59df9f6f1fcf7b5c7ee6ed0d1d694330N.exe
-
Size
120KB
-
Sample
240903-qvr9layhqb
-
MD5
59df9f6f1fcf7b5c7ee6ed0d1d694330
-
SHA1
c6b5fef993ba38a8af94058f5d036f024efd4c68
-
SHA256
7400d7a1414a062582fb671cbab89395f61ff0e5967339db58d66b8802117391
-
SHA512
1974a6fef4bc5d01ce3f2f5eaab749d7db2e380059c3986f7ed01670e998d3e83ccd560baf01b0fe14e556cbc03a3b56a2c3432dec4c8eee8381e24e6fcb4b03
-
SSDEEP
3072:ANCZvAslBvDhJf2OU8s9piSJNx3wCyRczUGmAE6:KMvAszDDbbIMtOU
Static task
static1
Behavioral task
behavioral1
Sample
59df9f6f1fcf7b5c7ee6ed0d1d694330N.dll
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
59df9f6f1fcf7b5c7ee6ed0d1d694330N.exe
-
Size
120KB
-
MD5
59df9f6f1fcf7b5c7ee6ed0d1d694330
-
SHA1
c6b5fef993ba38a8af94058f5d036f024efd4c68
-
SHA256
7400d7a1414a062582fb671cbab89395f61ff0e5967339db58d66b8802117391
-
SHA512
1974a6fef4bc5d01ce3f2f5eaab749d7db2e380059c3986f7ed01670e998d3e83ccd560baf01b0fe14e556cbc03a3b56a2c3432dec4c8eee8381e24e6fcb4b03
-
SSDEEP
3072:ANCZvAslBvDhJf2OU8s9piSJNx3wCyRczUGmAE6:KMvAszDDbbIMtOU
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5