General
-
Target
08e9067aa07ac4de151ec8ce01734ccd3956d69da45bc6c34cc0b4c6483b0d9c.exe
-
Size
377KB
-
Sample
241230-tp48rayrhk
-
MD5
4824f9b622937d5fefa8a159615fe300
-
SHA1
bfe07cd25385e7aa1f293f4eae7f32d63ec53846
-
SHA256
08e9067aa07ac4de151ec8ce01734ccd3956d69da45bc6c34cc0b4c6483b0d9c
-
SHA512
f1aca323b49e78f2025fbc613ccf708aab8552ab658f75ac020e4ff6ff240b5f5bc9e7c7583d268157d6565a821515660227393d8c5cc6337811b5e45d4ddec6
-
SSDEEP
6144:sxGMku94XCzTurXzURlbDC9K69u2m+SqOWcsQQKiY4leDDGoggH/VREG6j4Gm01l:sxGCOXzURlbDC9K69u2m+SqOWcsQQKi9
Static task
static1
Behavioral task
behavioral1
Sample
08e9067aa07ac4de151ec8ce01734ccd3956d69da45bc6c34cc0b4c6483b0d9c.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
08e9067aa07ac4de151ec8ce01734ccd3956d69da45bc6c34cc0b4c6483b0d9c.exe
-
Size
377KB
-
MD5
4824f9b622937d5fefa8a159615fe300
-
SHA1
bfe07cd25385e7aa1f293f4eae7f32d63ec53846
-
SHA256
08e9067aa07ac4de151ec8ce01734ccd3956d69da45bc6c34cc0b4c6483b0d9c
-
SHA512
f1aca323b49e78f2025fbc613ccf708aab8552ab658f75ac020e4ff6ff240b5f5bc9e7c7583d268157d6565a821515660227393d8c5cc6337811b5e45d4ddec6
-
SSDEEP
6144:sxGMku94XCzTurXzURlbDC9K69u2m+SqOWcsQQKiY4leDDGoggH/VREG6j4Gm01l:sxGCOXzURlbDC9K69u2m+SqOWcsQQKi9
-
Modifies firewall policy service
-
Ramnit family
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6