General
-
Target
51e87225d4320243c5886cad9e202b7a
-
Size
128KB
-
Sample
240110-3dp45abaf8
-
MD5
51e87225d4320243c5886cad9e202b7a
-
SHA1
a80226b1ded7265ad997bc6ce90f3dbdb7b8fec9
-
SHA256
27cd7e1bf1cbba01738433454e1e3d087ee244b21d86a0cbb3c80529ea8812f1
-
SHA512
4316ce1708b343d6efd759a12dbe4aded7551dc3d5d7f2b8c1744d7aad12ae3180de9c126fa30155ba2e8a1ccd91f115b4efd16fc4ee490e0d6e750ed9aeda44
-
SSDEEP
3072:VU2yx0Cs5Nh77P5KEIjZTjyITOFPc9QqlVFfYHbqtW1Ga3jVGMN1j:VkRszh7bQ9e9Fujdg2ENh
Static task
static1
Behavioral task
behavioral1
Sample
51e87225d4320243c5886cad9e202b7a.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
51e87225d4320243c5886cad9e202b7a
-
Size
128KB
-
MD5
51e87225d4320243c5886cad9e202b7a
-
SHA1
a80226b1ded7265ad997bc6ce90f3dbdb7b8fec9
-
SHA256
27cd7e1bf1cbba01738433454e1e3d087ee244b21d86a0cbb3c80529ea8812f1
-
SHA512
4316ce1708b343d6efd759a12dbe4aded7551dc3d5d7f2b8c1744d7aad12ae3180de9c126fa30155ba2e8a1ccd91f115b4efd16fc4ee490e0d6e750ed9aeda44
-
SSDEEP
3072:VU2yx0Cs5Nh77P5KEIjZTjyITOFPc9QqlVFfYHbqtW1Ga3jVGMN1j:VkRszh7bQ9e9Fujdg2ENh
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5