General
-
Target
36de0e64bf4085a6719b2dd4a5dfa64a
-
Size
100KB
-
Sample
231231-p5dnhsfcb9
-
MD5
36de0e64bf4085a6719b2dd4a5dfa64a
-
SHA1
988d39271a87c08e08303e02f168dae65a757cb2
-
SHA256
47dda038a91ffbb268223a6790d61bc61cc501fb8b20d1f2e28a630e9925b50a
-
SHA512
3a12ced6708766f150ffbae9e563de047a91b2a0aa1f5d6e081070a2830d7f0b90dd59eeef0825d60363198190c4d709e0ad5d73b5aca643fbdd664c9bb744f1
-
SSDEEP
1536:bNX6qhH38y57rKupmnGPru9rPttVVVdertlCmc:bNVB38iKup2QrePtZVderSm
Static task
static1
Behavioral task
behavioral1
Sample
36de0e64bf4085a6719b2dd4a5dfa64a.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
36de0e64bf4085a6719b2dd4a5dfa64a
-
Size
100KB
-
MD5
36de0e64bf4085a6719b2dd4a5dfa64a
-
SHA1
988d39271a87c08e08303e02f168dae65a757cb2
-
SHA256
47dda038a91ffbb268223a6790d61bc61cc501fb8b20d1f2e28a630e9925b50a
-
SHA512
3a12ced6708766f150ffbae9e563de047a91b2a0aa1f5d6e081070a2830d7f0b90dd59eeef0825d60363198190c4d709e0ad5d73b5aca643fbdd664c9bb744f1
-
SSDEEP
1536:bNX6qhH38y57rKupmnGPru9rPttVVVdertlCmc:bNVB38iKup2QrePtZVderSm
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5