General
-
Target
7a53afa8803e5d8cb169fd067437fe51
-
Size
507KB
-
Sample
240127-qa36cseecr
-
MD5
7a53afa8803e5d8cb169fd067437fe51
-
SHA1
a81acc31b598e1a640ef91b1c4abcbf827f17a0f
-
SHA256
1fd09d82c72e2f59384bb25dd6a47a6d45e38d2d6aad5a3df19d8dc2f4dd69dd
-
SHA512
f8df2250af6be54e38f8bf127d66791dd1eee94c09996443162a66644de31f1f270d17bd7314f193a109db2c838545f579839ba1e758463bc3a532728b05bbb7
-
SSDEEP
12288:SLgI37qsC/rHyq6ADx09nJenVjP1/y9TTl5D7RIF5TQwRh6lC3fj:Sb37qsC/jyq6c3mTl5DmgwAIfj
Static task
static1
Behavioral task
behavioral1
Sample
7a53afa8803e5d8cb169fd067437fe51.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
http://klkjwre77638dfqwieuoi888.info/
Targets
-
-
Target
7a53afa8803e5d8cb169fd067437fe51
-
Size
507KB
-
MD5
7a53afa8803e5d8cb169fd067437fe51
-
SHA1
a81acc31b598e1a640ef91b1c4abcbf827f17a0f
-
SHA256
1fd09d82c72e2f59384bb25dd6a47a6d45e38d2d6aad5a3df19d8dc2f4dd69dd
-
SHA512
f8df2250af6be54e38f8bf127d66791dd1eee94c09996443162a66644de31f1f270d17bd7314f193a109db2c838545f579839ba1e758463bc3a532728b05bbb7
-
SSDEEP
12288:SLgI37qsC/rHyq6ADx09nJenVjP1/y9TTl5D7RIF5TQwRh6lC3fj:Sb37qsC/jyq6c3mTl5DmgwAIfj
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1