General
-
Target
0e7c87f583b8cae116f1c348744e2f18
-
Size
100KB
-
Sample
231225-h745xscgf7
-
MD5
0e7c87f583b8cae116f1c348744e2f18
-
SHA1
bb543934b26bca26b34e10144d36ea2b5792f054
-
SHA256
38f2c409f408aa161ed171347e256cdc5350dc73dffb981a82845ddfcfb212d0
-
SHA512
91545f9353be1d44251801728be0646f5d7364bdf4e0a522a5f69b4d98024f66eba15332261c7ba98081223e98e2f0671469e2fa2f82c94e338c9e4a1118416e
-
SSDEEP
3072:1F2dqOGuhkTNRAKRo82S8qKRqcxJJybAs:32dqOBhiNTRv2nqKRqcxJAb
Static task
static1
Behavioral task
behavioral1
Sample
0e7c87f583b8cae116f1c348744e2f18.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
0e7c87f583b8cae116f1c348744e2f18
-
Size
100KB
-
MD5
0e7c87f583b8cae116f1c348744e2f18
-
SHA1
bb543934b26bca26b34e10144d36ea2b5792f054
-
SHA256
38f2c409f408aa161ed171347e256cdc5350dc73dffb981a82845ddfcfb212d0
-
SHA512
91545f9353be1d44251801728be0646f5d7364bdf4e0a522a5f69b4d98024f66eba15332261c7ba98081223e98e2f0671469e2fa2f82c94e338c9e4a1118416e
-
SSDEEP
3072:1F2dqOGuhkTNRAKRo82S8qKRqcxJJybAs:32dqOBhiNTRv2nqKRqcxJAb
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5