General
-
Target
18bd9914becd357fbf667549252d785872b8dee5f5a6938a29cdd7c2d5b78068
-
Size
352KB
-
Sample
220919-wpqrgabga6
-
MD5
6c88ebbff5487770ac4ea8a9ab3bd128
-
SHA1
3b05f1103d09317450a5160d26f695a6c7ef8b8a
-
SHA256
18bd9914becd357fbf667549252d785872b8dee5f5a6938a29cdd7c2d5b78068
-
SHA512
ca466d14c5678983db6192c4453fcad34623448923336414b5be7205d2f076526312327518bfda182da3ddae8b46b0a21e1fbabe2702ea1432c1264fd1970009
-
SSDEEP
6144:slZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lblJkiIWGR2thFJ0yKn0:sHLUMuiv9RgfSjAzRtyB8GJ0yK0
Behavioral task
behavioral1
Sample
18bd9914becd357fbf667549252d785872b8dee5f5a6938a29cdd7c2d5b78068.exe
Resource
win7-20220901-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
18bd9914becd357fbf667549252d785872b8dee5f5a6938a29cdd7c2d5b78068
-
Size
352KB
-
MD5
6c88ebbff5487770ac4ea8a9ab3bd128
-
SHA1
3b05f1103d09317450a5160d26f695a6c7ef8b8a
-
SHA256
18bd9914becd357fbf667549252d785872b8dee5f5a6938a29cdd7c2d5b78068
-
SHA512
ca466d14c5678983db6192c4453fcad34623448923336414b5be7205d2f076526312327518bfda182da3ddae8b46b0a21e1fbabe2702ea1432c1264fd1970009
-
SSDEEP
6144:slZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lblJkiIWGR2thFJ0yKn0:sHLUMuiv9RgfSjAzRtyB8GJ0yK0
-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
1Hidden Files and Directories
2Modify Registry
7