General
-
Target
ed67069206aea8164ef88f450b0d1241f4b2d85021654a35ffcbdcc13a103402
-
Size
315KB
-
Sample
221011-trf9psdcf9
-
MD5
13c40073a879095fbc2327a908301636
-
SHA1
b4c78c9792520b7396afd8f678ce50ccdb651220
-
SHA256
ed67069206aea8164ef88f450b0d1241f4b2d85021654a35ffcbdcc13a103402
-
SHA512
e94ca7f2aacd0c67907f42586ef43d0296ae7227480fd4c138b8801e6ee11b2f2ebe48d4a5ded30f7b7af428a61de884d23ecdfd16b79ef4cc5a4ddc6ab69e3a
-
SSDEEP
6144:dxlZaFDLrItkluXRuBvusFjJemp8dqoOiEzfZigLyMXbSlgHKpMwEUVHt:XlQ8fXEBvuwjInnLEzRiAyMXbKAuVN
Behavioral task
behavioral1
Sample
ed67069206aea8164ef88f450b0d1241f4b2d85021654a35ffcbdcc13a103402.exe
Resource
win7-20220812-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ed67069206aea8164ef88f450b0d1241f4b2d85021654a35ffcbdcc13a103402
-
Size
315KB
-
MD5
13c40073a879095fbc2327a908301636
-
SHA1
b4c78c9792520b7396afd8f678ce50ccdb651220
-
SHA256
ed67069206aea8164ef88f450b0d1241f4b2d85021654a35ffcbdcc13a103402
-
SHA512
e94ca7f2aacd0c67907f42586ef43d0296ae7227480fd4c138b8801e6ee11b2f2ebe48d4a5ded30f7b7af428a61de884d23ecdfd16b79ef4cc5a4ddc6ab69e3a
-
SSDEEP
6144:dxlZaFDLrItkluXRuBvusFjJemp8dqoOiEzfZigLyMXbSlgHKpMwEUVHt:XlQ8fXEBvuwjInnLEzRiAyMXbKAuVN
-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
3Install Root Certificate
1Modify Registry
7