General
-
Target
08fe57090e81141f12b0ad75b7c8e000N.exe
-
Size
1.7MB
-
Sample
240907-nje4sa1hkq
-
MD5
08fe57090e81141f12b0ad75b7c8e000
-
SHA1
6ec717b8cc53f6b77142031bb9c58d5c0aed541a
-
SHA256
06dcbfbb973c550ad8552fdeb419c81d3c142963a45a6ff2dab8d65187fd214b
-
SHA512
51d94bbbd28a499fa587cdc6b04fbe3990f0099dd96c3d0f55d100479d021877772cbfa4d4e285b7ef4c6ad76ecadb48383a02af89418dfb86de22db0cb86aa1
-
SSDEEP
49152:Tu0LSVHASxN9aD7sOP93ZPaZRNsa95ZN5O:y0mVgSxa872avQ
Static task
static1
Behavioral task
behavioral1
Sample
08fe57090e81141f12b0ad75b7c8e000N.exe
Resource
win7-20240704-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
08fe57090e81141f12b0ad75b7c8e000N.exe
-
Size
1.7MB
-
MD5
08fe57090e81141f12b0ad75b7c8e000
-
SHA1
6ec717b8cc53f6b77142031bb9c58d5c0aed541a
-
SHA256
06dcbfbb973c550ad8552fdeb419c81d3c142963a45a6ff2dab8d65187fd214b
-
SHA512
51d94bbbd28a499fa587cdc6b04fbe3990f0099dd96c3d0f55d100479d021877772cbfa4d4e285b7ef4c6ad76ecadb48383a02af89418dfb86de22db0cb86aa1
-
SSDEEP
49152:Tu0LSVHASxN9aD7sOP93ZPaZRNsa95ZN5O:y0mVgSxa872avQ
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6