General
-
Target
689dda417fde3ff18f7e5c3bbdd6edbc18f6a2cb0112a5489c9518741282a195
-
Size
1.3MB
-
Sample
241101-jp4l4sxjas
-
MD5
b8173f11d1025ea44547e84fe3eebfc9
-
SHA1
3cc0df741688308f6479f3640fae9af01e3e145c
-
SHA256
689dda417fde3ff18f7e5c3bbdd6edbc18f6a2cb0112a5489c9518741282a195
-
SHA512
0ceda0bfe1811d0d4b0de6944950dbc51d7f42109e576d985ec7783862a6b2a5b240604aba2c0fbfcc31a6e500fd1d4a1769cc68d296996ba95df510d95b0130
-
SSDEEP
12288:5qOPajQUXXP8QvLWFx6Mo5rippDC7ee1hpls4Ey+ES3umGbTOZwF:5najQEPnvg6PhWDC7507aW4
Static task
static1
Behavioral task
behavioral1
Sample
689dda417fde3ff18f7e5c3bbdd6edbc18f6a2cb0112a5489c9518741282a195.exe
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
689dda417fde3ff18f7e5c3bbdd6edbc18f6a2cb0112a5489c9518741282a195
-
Size
1.3MB
-
MD5
b8173f11d1025ea44547e84fe3eebfc9
-
SHA1
3cc0df741688308f6479f3640fae9af01e3e145c
-
SHA256
689dda417fde3ff18f7e5c3bbdd6edbc18f6a2cb0112a5489c9518741282a195
-
SHA512
0ceda0bfe1811d0d4b0de6944950dbc51d7f42109e576d985ec7783862a6b2a5b240604aba2c0fbfcc31a6e500fd1d4a1769cc68d296996ba95df510d95b0130
-
SSDEEP
12288:5qOPajQUXXP8QvLWFx6Mo5rippDC7ee1hpls4Ey+ES3umGbTOZwF:5najQEPnvg6PhWDC7507aW4
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Ramnit family
-
Sality family
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7