General
-
Target
2d5c9311b77e4f80c98fd7507b3be107a043455e648d5b9580571059e3ec35c2
-
Size
831KB
-
Sample
221106-e6xsnsfbdr
-
MD5
03a1db12fdf78bede48d7818e8c7e716
-
SHA1
a50e67b83c7d88b5282f4b28b386b6e84cfe8d7b
-
SHA256
2d5c9311b77e4f80c98fd7507b3be107a043455e648d5b9580571059e3ec35c2
-
SHA512
ad60b8bcdb66f30ec3c959cf5843529fb6d6d18ca2ed5a17897d8ed2f773e16c697dd3893c5f453adadffa205e08513c5b8cab17ac68fc431ec7f4322b9a0bb0
-
SSDEEP
6144:sJUkY1YZRQxt3t8vH7xi6pr8Przj9SsckOXVWqCJKc0HLkW0DM+ljq:sJUF1Y7CVtktVpr8PrfOkYWXJtO8Pq
Static task
static1
Behavioral task
behavioral1
Sample
2d5c9311b77e4f80c98fd7507b3be107a043455e648d5b9580571059e3ec35c2.exe
Resource
win7-20220812-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
2d5c9311b77e4f80c98fd7507b3be107a043455e648d5b9580571059e3ec35c2
-
Size
831KB
-
MD5
03a1db12fdf78bede48d7818e8c7e716
-
SHA1
a50e67b83c7d88b5282f4b28b386b6e84cfe8d7b
-
SHA256
2d5c9311b77e4f80c98fd7507b3be107a043455e648d5b9580571059e3ec35c2
-
SHA512
ad60b8bcdb66f30ec3c959cf5843529fb6d6d18ca2ed5a17897d8ed2f773e16c697dd3893c5f453adadffa205e08513c5b8cab17ac68fc431ec7f4322b9a0bb0
-
SSDEEP
6144:sJUkY1YZRQxt3t8vH7xi6pr8Przj9SsckOXVWqCJKc0HLkW0DM+ljq:sJUF1Y7CVtktVpr8PrfOkYWXJtO8Pq
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Modifies system executable filetype association
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Hidden Files and Directories
1Modify Existing Service
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
3Hidden Files and Directories
1Modify Registry
12