General
-
Target
511ac40bcf2677a66693573adc6fb3e4.exe
-
Size
100KB
-
Sample
240110-x7w7mseghl
-
MD5
511ac40bcf2677a66693573adc6fb3e4
-
SHA1
97e5f87a128173d39c45da5753bb608ee44efacd
-
SHA256
09c00bc77fca5a00999fd6b707b185d5f7f2f5bbe406e393e3ba6508151c3535
-
SHA512
a97826af26d73b87769105e2e291335708e50dfba811d9f562318e60fec39b221f33b569bcb76824d49152d738599252f30695dcb4343be4445cad421e192c61
-
SSDEEP
3072:npRKE5fF5ObLNEtzPgGJJeRRMKeKSLZFd5sFw7P:n3HF57zPgGJJeRC7zsa
Static task
static1
Behavioral task
behavioral1
Sample
511ac40bcf2677a66693573adc6fb3e4.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
511ac40bcf2677a66693573adc6fb3e4.exe
-
Size
100KB
-
MD5
511ac40bcf2677a66693573adc6fb3e4
-
SHA1
97e5f87a128173d39c45da5753bb608ee44efacd
-
SHA256
09c00bc77fca5a00999fd6b707b185d5f7f2f5bbe406e393e3ba6508151c3535
-
SHA512
a97826af26d73b87769105e2e291335708e50dfba811d9f562318e60fec39b221f33b569bcb76824d49152d738599252f30695dcb4343be4445cad421e192c61
-
SSDEEP
3072:npRKE5fF5ObLNEtzPgGJJeRRMKeKSLZFd5sFw7P:n3HF57zPgGJJeRC7zsa
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5