General
-
Target
cb073e42c472923c85081be6e6c75611
-
Size
100KB
-
Sample
240315-k5gyqacf5v
-
MD5
cb073e42c472923c85081be6e6c75611
-
SHA1
3a80fb10e074a037e40b0e14c383a34b914a8e79
-
SHA256
07b27e2e4a915629122147f37e76e2332b17c48282fe07036016d031fa29b975
-
SHA512
539b248049331e5e56161b0fc259a0def7189a907432c32a86ac66d56b03400221ec700265bddc29fe0d73bdf479bfe7e74fe8de41e979ce3633442a2d15dbf2
-
SSDEEP
1536:IbyMRHMa34JeC7Cq/XtmFKl88nKX9eFR1cC+LjeGl6ygS:n0M7Xf4FM8p4j1cfLXl6nS
Static task
static1
Behavioral task
behavioral1
Sample
cb073e42c472923c85081be6e6c75611.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
cb073e42c472923c85081be6e6c75611
-
Size
100KB
-
MD5
cb073e42c472923c85081be6e6c75611
-
SHA1
3a80fb10e074a037e40b0e14c383a34b914a8e79
-
SHA256
07b27e2e4a915629122147f37e76e2332b17c48282fe07036016d031fa29b975
-
SHA512
539b248049331e5e56161b0fc259a0def7189a907432c32a86ac66d56b03400221ec700265bddc29fe0d73bdf479bfe7e74fe8de41e979ce3633442a2d15dbf2
-
SSDEEP
1536:IbyMRHMa34JeC7Cq/XtmFKl88nKX9eFR1cC+LjeGl6ygS:n0M7Xf4FM8p4j1cfLXl6nS
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5