General
-
Target
8ae5079687de2fa00bb04ea846fc5447
-
Size
100KB
-
Sample
240203-ahly2scde7
-
MD5
8ae5079687de2fa00bb04ea846fc5447
-
SHA1
0cf71ff93734f68cc1f7c847673bdce76f6bf247
-
SHA256
23be5bd50752f46c0e641420fbae5320af6ac4cddd25662e5894f7098b3f218f
-
SHA512
aa2dc34a9eea10f1d5314e3999e790c92c05e801dcb19c19126fcaa324049eedf757265e62c0c859f9ac5ab5ff0b36330e189ffd8675f746c641decd26fc19ce
-
SSDEEP
1536:J8ltOM9c9PXLwiykgPO4B1aC8aygqvH9JPt4Wu8nAQFlGYDvGhQX6:J8ltu1LByVG4DahBfVJPtfuUNOM6
Static task
static1
Behavioral task
behavioral1
Sample
8ae5079687de2fa00bb04ea846fc5447.exe
Resource
win7-20231215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
8ae5079687de2fa00bb04ea846fc5447
-
Size
100KB
-
MD5
8ae5079687de2fa00bb04ea846fc5447
-
SHA1
0cf71ff93734f68cc1f7c847673bdce76f6bf247
-
SHA256
23be5bd50752f46c0e641420fbae5320af6ac4cddd25662e5894f7098b3f218f
-
SHA512
aa2dc34a9eea10f1d5314e3999e790c92c05e801dcb19c19126fcaa324049eedf757265e62c0c859f9ac5ab5ff0b36330e189ffd8675f746c641decd26fc19ce
-
SSDEEP
1536:J8ltOM9c9PXLwiykgPO4B1aC8aygqvH9JPt4Wu8nAQFlGYDvGhQX6:J8ltu1LByVG4DahBfVJPtfuUNOM6
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5