General
-
Target
a4af5b4299336ac6ab825c19abce8ee9f1906092274bc1da170b0d1f501d05a9.exe
-
Size
564KB
-
Sample
250119-p189maxqhz
-
MD5
a6a6f9fe40d0c51aa218a47dec9a366b
-
SHA1
6e3b88ff065f1e77fffc0898dbd673011e0df9df
-
SHA256
a4af5b4299336ac6ab825c19abce8ee9f1906092274bc1da170b0d1f501d05a9
-
SHA512
52c3a009cd44d32dffee2ba5dc9ced878aa14ade60d95a9fd18b03199e0e4c5a9696b8a519703377c185ffa6be82761fe67d8c7c61e37b896cf8d51dbf27b471
-
SSDEEP
12288:tehnaNPpSVZmNxRCwnwm3W3OHIIf5m9RhWFVm:teh0PpS6NxNnwYeOHXAhWTm
Static task
static1
Behavioral task
behavioral1
Sample
a4af5b4299336ac6ab825c19abce8ee9f1906092274bc1da170b0d1f501d05a9.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
a4af5b4299336ac6ab825c19abce8ee9f1906092274bc1da170b0d1f501d05a9.exe
-
Size
564KB
-
MD5
a6a6f9fe40d0c51aa218a47dec9a366b
-
SHA1
6e3b88ff065f1e77fffc0898dbd673011e0df9df
-
SHA256
a4af5b4299336ac6ab825c19abce8ee9f1906092274bc1da170b0d1f501d05a9
-
SHA512
52c3a009cd44d32dffee2ba5dc9ced878aa14ade60d95a9fd18b03199e0e4c5a9696b8a519703377c185ffa6be82761fe67d8c7c61e37b896cf8d51dbf27b471
-
SSDEEP
12288:tehnaNPpSVZmNxRCwnwm3W3OHIIf5m9RhWFVm:teh0PpS6NxNnwYeOHXAhWTm
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Ramnit family
-
Sality family
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7