General
-
Target
c5468bac306993b80e77d5cd746a372e
-
Size
100KB
-
Sample
240313-hw1clahc48
-
MD5
c5468bac306993b80e77d5cd746a372e
-
SHA1
dba60faebc709d3313e626df86f65f5e5184c168
-
SHA256
64c942b11a7dc6c52b2a72e051b5771800d3c8f8135f3e0837a082a1a9caa0de
-
SHA512
020119ee5e45008b4011c751292b0aeed9048e0e1a2b0a0a42f32df6d8f98d7141a573b05da92259750f8e610e265c571911d95129896fc05f1ce98a58ac912f
-
SSDEEP
3072:Jy507EvgCEuZhD64lsLPGY4kR6fo6LS51bfwt9:JsgCbZzIPGWh6LSot9
Static task
static1
Behavioral task
behavioral1
Sample
c5468bac306993b80e77d5cd746a372e.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
c5468bac306993b80e77d5cd746a372e
-
Size
100KB
-
MD5
c5468bac306993b80e77d5cd746a372e
-
SHA1
dba60faebc709d3313e626df86f65f5e5184c168
-
SHA256
64c942b11a7dc6c52b2a72e051b5771800d3c8f8135f3e0837a082a1a9caa0de
-
SHA512
020119ee5e45008b4011c751292b0aeed9048e0e1a2b0a0a42f32df6d8f98d7141a573b05da92259750f8e610e265c571911d95129896fc05f1ce98a58ac912f
-
SSDEEP
3072:Jy507EvgCEuZhD64lsLPGY4kR6fo6LS51bfwt9:JsgCbZzIPGWh6LSot9
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5