General
-
Target
23f1e7cfc8cf536e194cc5f7802ba714663c157a7f4c9128bae0c28796160be4
-
Size
3.3MB
-
Sample
231001-bqfmnshg32
-
MD5
6db9897cb3dc1481f8bfdbd04605248c
-
SHA1
d1bc953ec6d73a45cc81acfe229cc93accd8cae9
-
SHA256
23f1e7cfc8cf536e194cc5f7802ba714663c157a7f4c9128bae0c28796160be4
-
SHA512
e7e28eec705101628358145ec6425b151d6bd4b88db9762d3460e6ff2a32eeb80497b57e94564a6016266a0abce337e88155b211cead842a07da851abda64d0d
-
SSDEEP
49152:+hKsq/yGfE++k/xdQ95plG4CbTZr39MemijbHJjpapR9qRs3UzSrrf0k:IkBm95plG4CXBFjpapR9jr7
Static task
static1
Behavioral task
behavioral1
Sample
23f1e7cfc8cf536e194cc5f7802ba714663c157a7f4c9128bae0c28796160be4.exe
Resource
win7-20230831-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
23f1e7cfc8cf536e194cc5f7802ba714663c157a7f4c9128bae0c28796160be4
-
Size
3.3MB
-
MD5
6db9897cb3dc1481f8bfdbd04605248c
-
SHA1
d1bc953ec6d73a45cc81acfe229cc93accd8cae9
-
SHA256
23f1e7cfc8cf536e194cc5f7802ba714663c157a7f4c9128bae0c28796160be4
-
SHA512
e7e28eec705101628358145ec6425b151d6bd4b88db9762d3460e6ff2a32eeb80497b57e94564a6016266a0abce337e88155b211cead842a07da851abda64d0d
-
SSDEEP
49152:+hKsq/yGfE++k/xdQ95plG4CbTZr39MemijbHJjpapR9qRs3UzSrrf0k:IkBm95plG4CXBFjpapR9jr7
-
Detect Blackmoon payload
-
Modifies firewall policy service
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
6