General
-
Target
bl4ke.exe
-
Size
469KB
-
Sample
241228-ddq9ravnfr
-
MD5
5d9e7031a5d7498bf610633a3d0f6981
-
SHA1
f11cd03ef06dd53e1cef1ff15693efc919030ac3
-
SHA256
e056b9ff0256dd40dac919efe92006ee49a3f50d222ab17e755c7dcdbc34a4fc
-
SHA512
0d846e552d8f2f344257bd6e65e4f3fbfc5d41d90892c9d19af3abe4dc4074a3c73e6802269800fdaaa90a0b0deb78bad40f0c1b75a34a6c840144f316945975
-
SSDEEP
6144:igQ9ahMwdrlDDX3RtZL7bieYMy4rZEqwpgJCNXFhHcuci:igQsMkrl5t0jINggJMFOuci
Static task
static1
Behavioral task
behavioral1
Sample
bl4ke.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Extracted
C:\Users\Admin\AppData\Local\Temp\YOUR_FILES_ARE_FUCKED.HTA
Targets
-
-
Target
bl4ke.exe
-
Size
469KB
-
MD5
5d9e7031a5d7498bf610633a3d0f6981
-
SHA1
f11cd03ef06dd53e1cef1ff15693efc919030ac3
-
SHA256
e056b9ff0256dd40dac919efe92006ee49a3f50d222ab17e755c7dcdbc34a4fc
-
SHA512
0d846e552d8f2f344257bd6e65e4f3fbfc5d41d90892c9d19af3abe4dc4074a3c73e6802269800fdaaa90a0b0deb78bad40f0c1b75a34a6c840144f316945975
-
SSDEEP
6144:igQ9ahMwdrlDDX3RtZL7bieYMy4rZEqwpgJCNXFhHcuci:igQsMkrl5t0jINggJMFOuci
-
Modifies firewall policy service
-
Sality family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Obfuscated Files or Information
1Command Obfuscation
1