General
-
Target
d55b819d7828c40532ec02714b72f8f0N
-
Size
120KB
-
Sample
240912-2nn45szdpf
-
MD5
d55b819d7828c40532ec02714b72f8f0
-
SHA1
6a70faaf0874c891de1c4fe7b42bfe7f343af7e4
-
SHA256
16562cd2981b9a394ca66dfee352823d8f2f12907fff450f30db0cb7c82be5d5
-
SHA512
9407239892c6040b06b40db1057599f05126c3b0a6d42310e2acd799cf401aeb6e6590910ba4c69979ceab13439749aacad38307bc684ba4d9d4a8571e6f7e4a
-
SSDEEP
3072:qr/g9LcGId+dmRWXGofR3lrwSyzkesA43m+:Yw40XJfRNF3b3
Static task
static1
Behavioral task
behavioral1
Sample
d55b819d7828c40532ec02714b72f8f0N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d55b819d7828c40532ec02714b72f8f0N
-
Size
120KB
-
MD5
d55b819d7828c40532ec02714b72f8f0
-
SHA1
6a70faaf0874c891de1c4fe7b42bfe7f343af7e4
-
SHA256
16562cd2981b9a394ca66dfee352823d8f2f12907fff450f30db0cb7c82be5d5
-
SHA512
9407239892c6040b06b40db1057599f05126c3b0a6d42310e2acd799cf401aeb6e6590910ba4c69979ceab13439749aacad38307bc684ba4d9d4a8571e6f7e4a
-
SSDEEP
3072:qr/g9LcGId+dmRWXGofR3lrwSyzkesA43m+:Yw40XJfRNF3b3
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5