General
-
Target
abf01f37f3233a446f1ba203d2c99e0f_JC.exe
-
Size
1.2MB
-
Sample
231010-1hpytaeh45
-
MD5
abf01f37f3233a446f1ba203d2c99e0f
-
SHA1
3fa185e11ee45123b113f67b2433217067724668
-
SHA256
b75a80fc32b8abfe0633d0616873e35beb70e59caaf06b54f4563fba2e908a74
-
SHA512
2e3ced8e98c68a36944b6fb273c0839739b2c9e084ae6ea4c5b8f34d0ee2f179d1003356efb9ad264e71646d4ed5ccf78ccdc980a745752be2a70f0ea06cde71
-
SSDEEP
24576:IMrbrn/mG9Pwrn/POzMQGEvGEPapJoedR5inu3i6ZTdDiUSgwt9faL+Wdi3oBMcX:IMHrn/X9Pwrn/POzMQGEvGE2linu3i6Z
Static task
static1
Behavioral task
behavioral1
Sample
abf01f37f3233a446f1ba203d2c99e0f_JC.exe
Resource
win7-20230831-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
abf01f37f3233a446f1ba203d2c99e0f_JC.exe
-
Size
1.2MB
-
MD5
abf01f37f3233a446f1ba203d2c99e0f
-
SHA1
3fa185e11ee45123b113f67b2433217067724668
-
SHA256
b75a80fc32b8abfe0633d0616873e35beb70e59caaf06b54f4563fba2e908a74
-
SHA512
2e3ced8e98c68a36944b6fb273c0839739b2c9e084ae6ea4c5b8f34d0ee2f179d1003356efb9ad264e71646d4ed5ccf78ccdc980a745752be2a70f0ea06cde71
-
SSDEEP
24576:IMrbrn/mG9Pwrn/POzMQGEvGEPapJoedR5inu3i6ZTdDiUSgwt9faL+Wdi3oBMcX:IMHrn/X9Pwrn/POzMQGEvGE2linu3i6Z
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies visibility of file extensions in Explorer
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
7Pre-OS Boot
1Bootkit
1