General
-
Target
e00f66823f6f9382ea63aaf1069c851122a4890395a494b828822fefb00d5cc8
-
Size
2.9MB
-
Sample
240630-rrrdkayhnf
-
MD5
490e1e2c51156303e8dcb5da19960e30
-
SHA1
240f9467766127a248adcaeb814ddc7cff461777
-
SHA256
e00f66823f6f9382ea63aaf1069c851122a4890395a494b828822fefb00d5cc8
-
SHA512
1f03f5abae55571a168476f2b21a8d14459ad47da5be340dd6d416f996b25f97fdfe6960d89cd1e0f048ba252249d4a836a690ae2a4c35b096b9c04a1eaca8cd
-
SSDEEP
49152:5esKAvZibeyiuftlobfTEBSUtGHjzUxSs/GS+1u:PKAAe/YtKbfTISYGDz6+E
Static task
static1
Behavioral task
behavioral1
Sample
e00f66823f6f9382ea63aaf1069c851122a4890395a494b828822fefb00d5cc8.exe
Resource
win7-20240611-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
e00f66823f6f9382ea63aaf1069c851122a4890395a494b828822fefb00d5cc8
-
Size
2.9MB
-
MD5
490e1e2c51156303e8dcb5da19960e30
-
SHA1
240f9467766127a248adcaeb814ddc7cff461777
-
SHA256
e00f66823f6f9382ea63aaf1069c851122a4890395a494b828822fefb00d5cc8
-
SHA512
1f03f5abae55571a168476f2b21a8d14459ad47da5be340dd6d416f996b25f97fdfe6960d89cd1e0f048ba252249d4a836a690ae2a4c35b096b9c04a1eaca8cd
-
SSDEEP
49152:5esKAvZibeyiuftlobfTEBSUtGHjzUxSs/GS+1u:PKAAe/YtKbfTISYGDz6+E
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1