General
-
Target
5d9b4e76fd29f0ab88f62b73add432b8a3c2b913f5e2f3ba68e7c4a0c8a5486b
-
Size
158KB
-
Sample
221129-h5r3ksbe8v
-
MD5
10ce317e240b505cfef1280437415e69
-
SHA1
4af3ed0710a25f04104373acb0a55bbede819348
-
SHA256
5d9b4e76fd29f0ab88f62b73add432b8a3c2b913f5e2f3ba68e7c4a0c8a5486b
-
SHA512
797479d1a4777f8c769c03643ae34d48f92381253e994f8fa550c8af93bb9ffb6f929ba6a0a79af153a16fbbb0dec650ce0b265d6835eaaed20fac06b9953ca0
-
SSDEEP
3072:/kAbfBFuDypnWnL+gkqpBh3S5W7uQBbNbJHA/ICy/0FS:JBFbnUoqpr3Wc/x
Static task
static1
Behavioral task
behavioral1
Sample
5d9b4e76fd29f0ab88f62b73add432b8a3c2b913f5e2f3ba68e7c4a0c8a5486b.exe
Resource
win7-20221111-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
5d9b4e76fd29f0ab88f62b73add432b8a3c2b913f5e2f3ba68e7c4a0c8a5486b
-
Size
158KB
-
MD5
10ce317e240b505cfef1280437415e69
-
SHA1
4af3ed0710a25f04104373acb0a55bbede819348
-
SHA256
5d9b4e76fd29f0ab88f62b73add432b8a3c2b913f5e2f3ba68e7c4a0c8a5486b
-
SHA512
797479d1a4777f8c769c03643ae34d48f92381253e994f8fa550c8af93bb9ffb6f929ba6a0a79af153a16fbbb0dec650ce0b265d6835eaaed20fac06b9953ca0
-
SSDEEP
3072:/kAbfBFuDypnWnL+gkqpBh3S5W7uQBbNbJHA/ICy/0FS:JBFbnUoqpr3Wc/x
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Disables RegEdit via registry modification
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v6
Persistence
Browser Extensions
1Hidden Files and Directories
2Modify Existing Service
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
3Hidden Files and Directories
2Modify Registry
11