General
-
Target
0d74a57c7f0434dac1f8484b57b157877ecb365888154b1cefc630fd062f009d.exe
-
Size
331KB
-
Sample
241203-3c6qgszlaz
-
MD5
4e742b16606bfbb5c775887050dc470c
-
SHA1
c2b89de064d42682948cab2a7cb9a1243f7bbf18
-
SHA256
0d74a57c7f0434dac1f8484b57b157877ecb365888154b1cefc630fd062f009d
-
SHA512
e49d464ae1e0463bf84214c19847acfe2224cb2a7cc58b96667fd31a2270cf9d72e529d91fb93fe6bcf324878d3b49aff4d8c55bbf4f260476e348217a90d3a2
-
SSDEEP
6144:aCIGPj038tAgFMldWNX+3jHTe6hhmcvv6ALVoBGVvfEH:Lj038t/FMldW43jHhmS5ouHE
Static task
static1
Behavioral task
behavioral1
Sample
0d74a57c7f0434dac1f8484b57b157877ecb365888154b1cefc630fd062f009d.dll
Resource
win7-20241023-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
0d74a57c7f0434dac1f8484b57b157877ecb365888154b1cefc630fd062f009d.exe
-
Size
331KB
-
MD5
4e742b16606bfbb5c775887050dc470c
-
SHA1
c2b89de064d42682948cab2a7cb9a1243f7bbf18
-
SHA256
0d74a57c7f0434dac1f8484b57b157877ecb365888154b1cefc630fd062f009d
-
SHA512
e49d464ae1e0463bf84214c19847acfe2224cb2a7cc58b96667fd31a2270cf9d72e529d91fb93fe6bcf324878d3b49aff4d8c55bbf4f260476e348217a90d3a2
-
SSDEEP
6144:aCIGPj038tAgFMldWNX+3jHTe6hhmcvv6ALVoBGVvfEH:Lj038t/FMldW43jHhmS5ouHE
-
Modifies firewall policy service
-
Ramnit family
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6