General
-
Target
ddc90ceb2fe45dad57289f3d1991dafdda833cc119511867b805b1d179b7b30dN.exe
-
Size
700KB
-
Sample
241219-zew3aayqav
-
MD5
a24dce7944629450d9bfa2695f355f30
-
SHA1
3debd1f6891fb4075792f6230e51ac02fbb3e956
-
SHA256
ddc90ceb2fe45dad57289f3d1991dafdda833cc119511867b805b1d179b7b30d
-
SHA512
b79b9bc5a5c39719500423a80965546564a393e2dd5bbdd0d2f8e735c8a38c062b02b9fdae91c390543bdd0d0758c79f1bd589ecc060f948943cec368be3140c
-
SSDEEP
12288:th8fZLyb9PzVMBC/HVMOp4PkxHLCYwZckMQMNVmLCyps3XHbPVD2BWRYO3xP:t8F+Pzr/Hfp4MIYwZckMQmILCy0XrVD3
Static task
static1
Behavioral task
behavioral1
Sample
ddc90ceb2fe45dad57289f3d1991dafdda833cc119511867b805b1d179b7b30dN.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
ddc90ceb2fe45dad57289f3d1991dafdda833cc119511867b805b1d179b7b30dN.exe
-
Size
700KB
-
MD5
a24dce7944629450d9bfa2695f355f30
-
SHA1
3debd1f6891fb4075792f6230e51ac02fbb3e956
-
SHA256
ddc90ceb2fe45dad57289f3d1991dafdda833cc119511867b805b1d179b7b30d
-
SHA512
b79b9bc5a5c39719500423a80965546564a393e2dd5bbdd0d2f8e735c8a38c062b02b9fdae91c390543bdd0d0758c79f1bd589ecc060f948943cec368be3140c
-
SSDEEP
12288:th8fZLyb9PzVMBC/HVMOp4PkxHLCYwZckMQMNVmLCyps3XHbPVD2BWRYO3xP:t8F+Pzr/Hfp4MIYwZckMQmILCy0XrVD3
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Ramnit family
-
Sality family
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1DLL Search Order Hijacking
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Hijack Execution Flow
1DLL Search Order Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hijack Execution Flow
1DLL Search Order Hijacking
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7