General
-
Target
d24e3826fb8807362eb0bcbb9893cfb0N
-
Size
120KB
-
Sample
240907-ylcrjs1gkr
-
MD5
d24e3826fb8807362eb0bcbb9893cfb0
-
SHA1
33650daa57c0221cb1e0a9908a5ec3af67378fd0
-
SHA256
2e9a4924a0ac00cfbdaa24d94b613c41fafef6a16a8af5e2889b86d73a03a167
-
SHA512
7e7929b9c3fc9b31761399722b1b978fabc5eab56a3809cc50f0cc3618492dad1bdc9d78323fcb43ee630e095c02643de0c9dab7dc7f8b64f64d3a485b949612
-
SSDEEP
3072:JxJgTauiUiVtOWu+YlMbjcTGIbQ1gG5eY9Ng/uzSFsQ0nd:LJ4auiRtOWoEcTGPiG524
Static task
static1
Behavioral task
behavioral1
Sample
d24e3826fb8807362eb0bcbb9893cfb0N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d24e3826fb8807362eb0bcbb9893cfb0N
-
Size
120KB
-
MD5
d24e3826fb8807362eb0bcbb9893cfb0
-
SHA1
33650daa57c0221cb1e0a9908a5ec3af67378fd0
-
SHA256
2e9a4924a0ac00cfbdaa24d94b613c41fafef6a16a8af5e2889b86d73a03a167
-
SHA512
7e7929b9c3fc9b31761399722b1b978fabc5eab56a3809cc50f0cc3618492dad1bdc9d78323fcb43ee630e095c02643de0c9dab7dc7f8b64f64d3a485b949612
-
SSDEEP
3072:JxJgTauiUiVtOWu+YlMbjcTGIbQ1gG5eY9Ng/uzSFsQ0nd:LJ4auiRtOWoEcTGPiG524
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5