General
-
Target
013e024e902dd75503f6a4d03c4f65dd587df99ed96fda0e63fd6205e48f801e
-
Size
120KB
-
Sample
240912-wn7nlaxapf
-
MD5
24fca6cd0e9e987ffbdf62a95c64c036
-
SHA1
9466cba75edb44febd241b06d0ce37ec5f74e0de
-
SHA256
013e024e902dd75503f6a4d03c4f65dd587df99ed96fda0e63fd6205e48f801e
-
SHA512
992739909b809d4d877f4d30b6fa06a7e7687f69b319aa1138516bda1087825b753f6f542380e295f4593270b25513d802988b0d4f10f64077a3739bcfa13e51
-
SSDEEP
3072:HFgHUp1r3zjFKvT0B6cFrk0Y0MV7JKiNop4:+0Dr3Qb0B5Fdta0Q
Static task
static1
Behavioral task
behavioral1
Sample
013e024e902dd75503f6a4d03c4f65dd587df99ed96fda0e63fd6205e48f801e.dll
Resource
win7-20240704-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
013e024e902dd75503f6a4d03c4f65dd587df99ed96fda0e63fd6205e48f801e
-
Size
120KB
-
MD5
24fca6cd0e9e987ffbdf62a95c64c036
-
SHA1
9466cba75edb44febd241b06d0ce37ec5f74e0de
-
SHA256
013e024e902dd75503f6a4d03c4f65dd587df99ed96fda0e63fd6205e48f801e
-
SHA512
992739909b809d4d877f4d30b6fa06a7e7687f69b319aa1138516bda1087825b753f6f542380e295f4593270b25513d802988b0d4f10f64077a3739bcfa13e51
-
SSDEEP
3072:HFgHUp1r3zjFKvT0B6cFrk0Y0MV7JKiNop4:+0Dr3Qb0B5Fdta0Q
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5