General
-
Target
c8a07422a4f79aa726f12eb9f2a47f850e7821f9a31a0b28ff70234769af9605N.exe
-
Size
716KB
-
Sample
250124-wyd42a1mew
-
MD5
a224ab583afbe09930703315db00d6a0
-
SHA1
70dedfdb31ea49b113bc4db583ababbbd88831ec
-
SHA256
c8a07422a4f79aa726f12eb9f2a47f850e7821f9a31a0b28ff70234769af9605
-
SHA512
0c7c41f3ef00625b46f672f6952737f7011a1e69fdebc785f99b7baeb57177b66511a45289cd7821080183e87eeaf504a1de5ae4e7cadba9562b16048ad8670a
-
SSDEEP
12288:9Hg3POWGRghDRUi/KsDj+Ea/TjOebZ3f2yeDOUCVh7XLvd:9HAOr2/jcbyAZfzv7
Static task
static1
Behavioral task
behavioral1
Sample
c8a07422a4f79aa726f12eb9f2a47f850e7821f9a31a0b28ff70234769af9605N.exe
Resource
win7-20241010-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
c8a07422a4f79aa726f12eb9f2a47f850e7821f9a31a0b28ff70234769af9605N.exe
-
Size
716KB
-
MD5
a224ab583afbe09930703315db00d6a0
-
SHA1
70dedfdb31ea49b113bc4db583ababbbd88831ec
-
SHA256
c8a07422a4f79aa726f12eb9f2a47f850e7821f9a31a0b28ff70234769af9605
-
SHA512
0c7c41f3ef00625b46f672f6952737f7011a1e69fdebc785f99b7baeb57177b66511a45289cd7821080183e87eeaf504a1de5ae4e7cadba9562b16048ad8670a
-
SSDEEP
12288:9Hg3POWGRghDRUi/KsDj+Ea/TjOebZ3f2yeDOUCVh7XLvd:9HAOr2/jcbyAZfzv7
-
Modifies firewall policy service
-
Ramnit family
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Executes dropped EXE
-
Loads dropped DLL
-
Windows security modification
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
6