General
-
Target
e02ec60c765ad19a9b8208683e5405759eadc2f5b0cbae871de3aab2734200f0
-
Size
164KB
-
Sample
221123-tdyltsgh3s
-
MD5
2cae7eb8884a32fc02d8fc59bbb9a6a4
-
SHA1
7e2d6a07f6632420adf23bcb279bef0734451438
-
SHA256
e02ec60c765ad19a9b8208683e5405759eadc2f5b0cbae871de3aab2734200f0
-
SHA512
fecbce262a0c19d0458b7b840f4071ec45f043a8c1ac33d8de060ee23d17da471ee836325e0684e857e2dbcd488889e73fbc3a0c070406939770ff97f6012f50
-
SSDEEP
3072:iJiKQuARJOcgKVoMJgBE10tDLBFMmy8TlOg:BnZKB6Why8Ag
Static task
static1
Behavioral task
behavioral1
Sample
e02ec60c765ad19a9b8208683e5405759eadc2f5b0cbae871de3aab2734200f0.exe
Resource
win7-20220812-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
e02ec60c765ad19a9b8208683e5405759eadc2f5b0cbae871de3aab2734200f0
-
Size
164KB
-
MD5
2cae7eb8884a32fc02d8fc59bbb9a6a4
-
SHA1
7e2d6a07f6632420adf23bcb279bef0734451438
-
SHA256
e02ec60c765ad19a9b8208683e5405759eadc2f5b0cbae871de3aab2734200f0
-
SHA512
fecbce262a0c19d0458b7b840f4071ec45f043a8c1ac33d8de060ee23d17da471ee836325e0684e857e2dbcd488889e73fbc3a0c070406939770ff97f6012f50
-
SSDEEP
3072:iJiKQuARJOcgKVoMJgBE10tDLBFMmy8TlOg:BnZKB6Why8Ag
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
3Modify Registry
7