General
-
Target
2025-04-04_61a4806f814d71db10ab47d197f0c6e3_black-basta_hijackloader_luca-stealer_remcos
-
Size
21.2MB
-
Sample
250404-w8xn5assgv
-
MD5
61a4806f814d71db10ab47d197f0c6e3
-
SHA1
25f209c16327d8855e66df77f75229537a9ed3b0
-
SHA256
dc1712f9b470acc377bc78b5a31674cb18278d23032f8e498b99c97f0194a532
-
SHA512
8cbfcfc1cc7e4590bc9ca501dc833a101232b04a1748a9e7a10b37e8aa237082d6f05a1ae253d01ebea0a08353276253c1f4c625fde7fca1e7460bf5b34eba2f
-
SSDEEP
196608:1XMo3++tr2ZI97ai4pNEm6IUDguV9NA+WZfXvuPTxhbmWqPWpyR1pOIIIIIIIIIb:ZEZIIi4b2jgqFhlqPWpyR1pV1
Static task
static1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2025-04-04_61a4806f814d71db10ab47d197f0c6e3_black-basta_hijackloader_luca-stealer_remcos
-
Size
21.2MB
-
MD5
61a4806f814d71db10ab47d197f0c6e3
-
SHA1
25f209c16327d8855e66df77f75229537a9ed3b0
-
SHA256
dc1712f9b470acc377bc78b5a31674cb18278d23032f8e498b99c97f0194a532
-
SHA512
8cbfcfc1cc7e4590bc9ca501dc833a101232b04a1748a9e7a10b37e8aa237082d6f05a1ae253d01ebea0a08353276253c1f4c625fde7fca1e7460bf5b34eba2f
-
SSDEEP
196608:1XMo3++tr2ZI97ai4pNEm6IUDguV9NA+WZfXvuPTxhbmWqPWpyR1pOIIIIIIIIIb:ZEZIIi4b2jgqFhlqPWpyR1pV1
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5