General
-
Target
e07bf599cc6052136e2c987848f9e2ac32a2d2e8519410a1943c32d4dbc0fe26
-
Size
148KB
-
Sample
221204-h9rmlsgh25
-
MD5
8c21a370bd149784cb7128d666543cc1
-
SHA1
7ad1dea7887f3f8256825b19590604b0d2c5beb7
-
SHA256
e07bf599cc6052136e2c987848f9e2ac32a2d2e8519410a1943c32d4dbc0fe26
-
SHA512
5a91000b2b57063899f2744ddffddbdb7095088de70e46ccccc0ceaeab77b012cf81fd5b7db7b01136f63bae4051d88cc8c600ab0729206e036ae95644cf0fc0
-
SSDEEP
3072:eahsmpcReL9DxyjcI4zhawZ1CWRtHD24gEtYqniX:/hsmxLKIaMrR12lsYqS
Static task
static1
Behavioral task
behavioral1
Sample
e07bf599cc6052136e2c987848f9e2ac32a2d2e8519410a1943c32d4dbc0fe26.exe
Resource
win7-20221111-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
e07bf599cc6052136e2c987848f9e2ac32a2d2e8519410a1943c32d4dbc0fe26
-
Size
148KB
-
MD5
8c21a370bd149784cb7128d666543cc1
-
SHA1
7ad1dea7887f3f8256825b19590604b0d2c5beb7
-
SHA256
e07bf599cc6052136e2c987848f9e2ac32a2d2e8519410a1943c32d4dbc0fe26
-
SHA512
5a91000b2b57063899f2744ddffddbdb7095088de70e46ccccc0ceaeab77b012cf81fd5b7db7b01136f63bae4051d88cc8c600ab0729206e036ae95644cf0fc0
-
SSDEEP
3072:eahsmpcReL9DxyjcI4zhawZ1CWRtHD24gEtYqniX:/hsmxLKIaMrR12lsYqS
-
Modifies firewall policy service
-
Modifies visiblity of hidden/system files in Explorer
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v6
Persistence
Hidden Files and Directories
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
3Hidden Files and Directories
1Modify Registry
7