General
-
Target
16b76886a277b914372d8ad3da50f511
-
Size
520KB
-
Sample
231225-mcxvksefc4
-
MD5
16b76886a277b914372d8ad3da50f511
-
SHA1
375fd05f0ecfb36884ebf80aa951738e44b9481f
-
SHA256
33001f3175b74bd653f9e2cd2aafeb280820b8778d71f4f859058548f12f4c2f
-
SHA512
43e355dbabd6abef06fe6bf00c140552be70f21f43977b6973730c865c597abd61ce7032eab004ef38fc6e42d0de9a988380e5dbf049583914c3c8d433b151d7
-
SSDEEP
12288:Gy7GJaXTC4IsjkvK1gtvkUTWFnH//ZNm45eO:tXcLKGtsfx1v
Static task
static1
Behavioral task
behavioral1
Sample
16b76886a277b914372d8ad3da50f511.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
16b76886a277b914372d8ad3da50f511
-
Size
520KB
-
MD5
16b76886a277b914372d8ad3da50f511
-
SHA1
375fd05f0ecfb36884ebf80aa951738e44b9481f
-
SHA256
33001f3175b74bd653f9e2cd2aafeb280820b8778d71f4f859058548f12f4c2f
-
SHA512
43e355dbabd6abef06fe6bf00c140552be70f21f43977b6973730c865c597abd61ce7032eab004ef38fc6e42d0de9a988380e5dbf049583914c3c8d433b151d7
-
SSDEEP
12288:Gy7GJaXTC4IsjkvK1gtvkUTWFnH//ZNm45eO:tXcLKGtsfx1v
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies Installed Components in the registry
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
9