General
-
Target
02e961f359b92a8d8bd900249e1c5c99.exe
-
Size
100KB
-
Sample
240101-ypx7naghgk
-
MD5
02e961f359b92a8d8bd900249e1c5c99
-
SHA1
f8a29a77651495b76d4a7b4ebc2e03ee307848e0
-
SHA256
1bfd26f2a212f9b72953ed2b78287605d9b61006b3b82e95444b63324ab2977c
-
SHA512
42ba6ea2a30d5343b6958e5163444ece8b8290526e5e5f7dd91d7b6d94074f4b74d5dd13a84e3b439a96085aca2f733eefdb2d4a2d23117051e292905076f479
-
SSDEEP
1536:jtbyT/8zMi0GR2M+nPGuHVqsOaDGsSXGfNtcsHJKD/v9WpCNhrZJ7NTR+nJWjpRi:Zg8zP0GR5+nPrpOW6+JHMWMNdZ3Rz7i
Static task
static1
Behavioral task
behavioral1
Sample
02e961f359b92a8d8bd900249e1c5c99.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
02e961f359b92a8d8bd900249e1c5c99.exe
-
Size
100KB
-
MD5
02e961f359b92a8d8bd900249e1c5c99
-
SHA1
f8a29a77651495b76d4a7b4ebc2e03ee307848e0
-
SHA256
1bfd26f2a212f9b72953ed2b78287605d9b61006b3b82e95444b63324ab2977c
-
SHA512
42ba6ea2a30d5343b6958e5163444ece8b8290526e5e5f7dd91d7b6d94074f4b74d5dd13a84e3b439a96085aca2f733eefdb2d4a2d23117051e292905076f479
-
SSDEEP
1536:jtbyT/8zMi0GR2M+nPGuHVqsOaDGsSXGfNtcsHJKD/v9WpCNhrZJ7NTR+nJWjpRi:Zg8zP0GR5+nPrpOW6+JHMWMNdZ3Rz7i
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5