General
-
Target
8f6510ded6fe5b446780cd20d634e911dd32e77078b74b35bc5686ff17b417be
-
Size
97KB
-
Sample
240919-aagdlazeqg
-
MD5
58cde8cdb863977545f19f0d1aeb48de
-
SHA1
0b3c560dcfd64ba82865227b1fd1e3a8e256a5f6
-
SHA256
8f6510ded6fe5b446780cd20d634e911dd32e77078b74b35bc5686ff17b417be
-
SHA512
17912eba88aa1106990d3fa0255ba4f99a603b1bd48dcf8d76c508f2820f894ca4ff784d94367b325fcc61ca0062db0569fa7aec4d8bc9cdfbc81c7b18a63a76
-
SSDEEP
1536:Th7hkd9e7x5cHab8v5vnHUG+gRQ5upn05QHEHLMWqshIkW:Tfey5c6S5dhpnKsWckW
Static task
static1
Behavioral task
behavioral1
Sample
8f6510ded6fe5b446780cd20d634e911dd32e77078b74b35bc5686ff17b417be.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
8f6510ded6fe5b446780cd20d634e911dd32e77078b74b35bc5686ff17b417be
-
Size
97KB
-
MD5
58cde8cdb863977545f19f0d1aeb48de
-
SHA1
0b3c560dcfd64ba82865227b1fd1e3a8e256a5f6
-
SHA256
8f6510ded6fe5b446780cd20d634e911dd32e77078b74b35bc5686ff17b417be
-
SHA512
17912eba88aa1106990d3fa0255ba4f99a603b1bd48dcf8d76c508f2820f894ca4ff784d94367b325fcc61ca0062db0569fa7aec4d8bc9cdfbc81c7b18a63a76
-
SSDEEP
1536:Th7hkd9e7x5cHab8v5vnHUG+gRQ5upn05QHEHLMWqshIkW:Tfey5c6S5dhpnKsWckW
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5