General
-
Target
e31256b3fe1297a83302a1939ed688f11622a306eb3b6f8802d5c2d723988c34N.exe
-
Size
564KB
-
Sample
250120-y16yyaxkbl
-
MD5
e3052e2019a1ee5b1bfbfcd98ae42a00
-
SHA1
3b9a2a534979d4694c257c7139250e91d6776dee
-
SHA256
e31256b3fe1297a83302a1939ed688f11622a306eb3b6f8802d5c2d723988c34
-
SHA512
91cb24f0b27f235f6325f902d91503f63e8706885f212dfba0e330aeb34015bb00bd33b27585a2bf2a731eaa2dcc512c4f007aaa9e673ed96ae5317af9ba9e50
-
SSDEEP
12288:tehnaNPpSVZmNxRCwnwm3W3OHIIf5m9RhWFV/:teh0PpS6NxNnwYeOHXAhWT/
Static task
static1
Behavioral task
behavioral1
Sample
e31256b3fe1297a83302a1939ed688f11622a306eb3b6f8802d5c2d723988c34N.dll
Resource
win7-20240903-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
e31256b3fe1297a83302a1939ed688f11622a306eb3b6f8802d5c2d723988c34N.exe
-
Size
564KB
-
MD5
e3052e2019a1ee5b1bfbfcd98ae42a00
-
SHA1
3b9a2a534979d4694c257c7139250e91d6776dee
-
SHA256
e31256b3fe1297a83302a1939ed688f11622a306eb3b6f8802d5c2d723988c34
-
SHA512
91cb24f0b27f235f6325f902d91503f63e8706885f212dfba0e330aeb34015bb00bd33b27585a2bf2a731eaa2dcc512c4f007aaa9e673ed96ae5317af9ba9e50
-
SSDEEP
12288:tehnaNPpSVZmNxRCwnwm3W3OHIIf5m9RhWFV/:teh0PpS6NxNnwYeOHXAhWT/
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Ramnit family
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7