General
-
Target
04beebd710a36d6d1993be76d3374b88fb7e99fa077cc4e78e2fbcace4efce29N
-
Size
120KB
-
Sample
240919-rhmzsasdrh
-
MD5
81c8e3c516b0a64f27ece4fcb34f15c0
-
SHA1
fbc54c2af784d2c8f5748727165d059fc94a3f0b
-
SHA256
04beebd710a36d6d1993be76d3374b88fb7e99fa077cc4e78e2fbcace4efce29
-
SHA512
f0dbbf6a830f24e1a16fca4461b5f82dc4649acc21fa9b7b2fe8dcbda3aec58e49a6518e10c680993e0e2e63ad86390d21a56b28755e2d18cf72627d647ac75a
-
SSDEEP
1536:4VLyhwfXIWXNGzs+d5KxiwpiJUXl0OCUzxaub/ore/Wyj3AEbAyNjqGvdqdCEVvj:4Rq5GGI+wiwpiJWXzeEvNjh8CE5j
Static task
static1
Behavioral task
behavioral1
Sample
04beebd710a36d6d1993be76d3374b88fb7e99fa077cc4e78e2fbcace4efce29N.dll
Resource
win7-20240704-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
04beebd710a36d6d1993be76d3374b88fb7e99fa077cc4e78e2fbcace4efce29N
-
Size
120KB
-
MD5
81c8e3c516b0a64f27ece4fcb34f15c0
-
SHA1
fbc54c2af784d2c8f5748727165d059fc94a3f0b
-
SHA256
04beebd710a36d6d1993be76d3374b88fb7e99fa077cc4e78e2fbcace4efce29
-
SHA512
f0dbbf6a830f24e1a16fca4461b5f82dc4649acc21fa9b7b2fe8dcbda3aec58e49a6518e10c680993e0e2e63ad86390d21a56b28755e2d18cf72627d647ac75a
-
SSDEEP
1536:4VLyhwfXIWXNGzs+d5KxiwpiJUXl0OCUzxaub/ore/Wyj3AEbAyNjqGvdqdCEVvj:4Rq5GGI+wiwpiJWXzeEvNjh8CE5j
-
Modifies firewall policy service
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5