General
-
Target
0d36c210069bbf7751312bc70dbd6914
-
Size
419KB
-
Sample
231225-hr4t8ahddq
-
MD5
0d36c210069bbf7751312bc70dbd6914
-
SHA1
0214965b53fbaca606923e414371c3df0858f9d5
-
SHA256
55cb420aa62056adf58ce5a4af6379fe92cfa7dc7fa275bced7c29bac5a2b99a
-
SHA512
568a049dd4409f72fcfb14027933201289d7324254b6f208a93680c4c18dcd7debc49db8607d0601b80e18cdbfbc22e0b77a0ca9c5b33a413efa2eab258b23aa
-
SSDEEP
12288:nrlhGgt068RPhxGnKro1xeR9b249x3j4D:nrlDS9RPhxGngeIb24D3j4D
Static task
static1
Behavioral task
behavioral1
Sample
0d36c210069bbf7751312bc70dbd6914.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
0d36c210069bbf7751312bc70dbd6914
-
Size
419KB
-
MD5
0d36c210069bbf7751312bc70dbd6914
-
SHA1
0214965b53fbaca606923e414371c3df0858f9d5
-
SHA256
55cb420aa62056adf58ce5a4af6379fe92cfa7dc7fa275bced7c29bac5a2b99a
-
SHA512
568a049dd4409f72fcfb14027933201289d7324254b6f208a93680c4c18dcd7debc49db8607d0601b80e18cdbfbc22e0b77a0ca9c5b33a413efa2eab258b23aa
-
SSDEEP
12288:nrlhGgt068RPhxGnKro1xeR9b249x3j4D:nrlDS9RPhxGngeIb24D3j4D
-
Modifies firewall policy service
-
Drops file in Drivers directory
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5