General
-
Target
2c8a9f0ffddaf7ac4f34cf2f326470376e5d027ece950d7439c3d6d21ce3b6fc
-
Size
217KB
-
Sample
221003-w5zpbaahcq
-
MD5
6d600d01be5203c717040e17ec805856
-
SHA1
b83c239c1b6a36d72be817154e634ff9ca57f0f9
-
SHA256
2c8a9f0ffddaf7ac4f34cf2f326470376e5d027ece950d7439c3d6d21ce3b6fc
-
SHA512
665920a613fce6de1b9f5de3e981c1f9c3e205d38fef2ab5944785410861d893d28ad4f6bd0cbc6ab0acfbbdc43c2f877a6a3b65dfb50b0109fbf6f9b7eea661
-
SSDEEP
6144:pWxJiXo3uEh+52BOPg4UI+OuPRuw81T54/h:psf3uT5TPghI+OuPs71A
Static task
static1
Behavioral task
behavioral1
Sample
2c8a9f0ffddaf7ac4f34cf2f326470376e5d027ece950d7439c3d6d21ce3b6fc.exe
Resource
win7-20220812-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2c8a9f0ffddaf7ac4f34cf2f326470376e5d027ece950d7439c3d6d21ce3b6fc
-
Size
217KB
-
MD5
6d600d01be5203c717040e17ec805856
-
SHA1
b83c239c1b6a36d72be817154e634ff9ca57f0f9
-
SHA256
2c8a9f0ffddaf7ac4f34cf2f326470376e5d027ece950d7439c3d6d21ce3b6fc
-
SHA512
665920a613fce6de1b9f5de3e981c1f9c3e205d38fef2ab5944785410861d893d28ad4f6bd0cbc6ab0acfbbdc43c2f877a6a3b65dfb50b0109fbf6f9b7eea661
-
SSDEEP
6144:pWxJiXo3uEh+52BOPg4UI+OuPRuw81T54/h:psf3uT5TPghI+OuPs71A
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
2Modify Existing Service
1Registry Run Keys / Startup Folder
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
3Hidden Files and Directories
2Modify Registry
8