General
-
Target
2025-04-04_7dcdd60c3fa75471fdbcd1a24b0e1eae_amadey_black-basta_luca-stealer_smoke-loader
-
Size
845KB
-
Sample
250404-z6a9wsvtbv
-
MD5
7dcdd60c3fa75471fdbcd1a24b0e1eae
-
SHA1
96454f95d78c3364fd3159f2e63ec34c41ba3b63
-
SHA256
6a2818d08940ee16eed5601d93d2f0d2d7a3c4a5c28ce750196b1f935fa209e0
-
SHA512
5b024a61adaee9abf647c46a926b9103fbf851fdf2bdcbb063e7585e59d6f8f7eca34e57a9b1ce7d53380c296312599cc89472a0a81519f599130ac148aa15cb
-
SSDEEP
24576:XgPqt4RABSF5Mab/AoLxbskWdcPkvQ7ldBFplM:QPq5qMKbZ6dlKldBFM
Static task
static1
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
2025-04-04_7dcdd60c3fa75471fdbcd1a24b0e1eae_amadey_black-basta_luca-stealer_smoke-loader
-
Size
845KB
-
MD5
7dcdd60c3fa75471fdbcd1a24b0e1eae
-
SHA1
96454f95d78c3364fd3159f2e63ec34c41ba3b63
-
SHA256
6a2818d08940ee16eed5601d93d2f0d2d7a3c4a5c28ce750196b1f935fa209e0
-
SHA512
5b024a61adaee9abf647c46a926b9103fbf851fdf2bdcbb063e7585e59d6f8f7eca34e57a9b1ce7d53380c296312599cc89472a0a81519f599130ac148aa15cb
-
SSDEEP
24576:XgPqt4RABSF5Mab/AoLxbskWdcPkvQ7ldBFplM:QPq5qMKbZ6dlKldBFM
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5