General
-
Target
badc48ce9b094beb04475bf9e502baad226ef0b8bb04fa22ad0495b7e48010b3N.exe
-
Size
331KB
-
Sample
241203-q5zrestlhq
-
MD5
b3a187c350f347332023816f5d33ef80
-
SHA1
3bda93b87f96061a5b613fce9b1388a66f44058b
-
SHA256
badc48ce9b094beb04475bf9e502baad226ef0b8bb04fa22ad0495b7e48010b3
-
SHA512
fd65b5586a030f1714c113dc3c2a26610420941d6bfbf9fd5278f9380a5be3e1b4b1d6aac5a1f766d580ba03247df1540d9f35718adcb0804afbb91c2423418d
-
SSDEEP
6144:aCIGPj038tAgFMldWNX+3jHTe6hhmcvv6ALVoBGVvfEf:Lj038t/FMldW43jHhmS5ouHE
Static task
static1
Behavioral task
behavioral1
Sample
badc48ce9b094beb04475bf9e502baad226ef0b8bb04fa22ad0495b7e48010b3N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
badc48ce9b094beb04475bf9e502baad226ef0b8bb04fa22ad0495b7e48010b3N.exe
-
Size
331KB
-
MD5
b3a187c350f347332023816f5d33ef80
-
SHA1
3bda93b87f96061a5b613fce9b1388a66f44058b
-
SHA256
badc48ce9b094beb04475bf9e502baad226ef0b8bb04fa22ad0495b7e48010b3
-
SHA512
fd65b5586a030f1714c113dc3c2a26610420941d6bfbf9fd5278f9380a5be3e1b4b1d6aac5a1f766d580ba03247df1540d9f35718adcb0804afbb91c2423418d
-
SSDEEP
6144:aCIGPj038tAgFMldWNX+3jHTe6hhmcvv6ALVoBGVvfEf:Lj038t/FMldW43jHhmS5ouHE
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Ramnit family
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7