General
-
Target
cdf5f90c4bbf439beaf029a1361a5838bb70883062261e4d32a6ac4ceec9c3f7
-
Size
1.4MB
-
Sample
240319-q9zl8adf25
-
MD5
fe720d31ad7bce3787e1a1f700bb8c07
-
SHA1
9d9d23c9cd9ff0d11f9732ddf84aecb18c560305
-
SHA256
cdf5f90c4bbf439beaf029a1361a5838bb70883062261e4d32a6ac4ceec9c3f7
-
SHA512
5f20afd6ace0863d153d4a3166702206bda59a464f0348b3870b04fb00ba1a1b36a69e978f65e1b43829f3bf94c5ed2da4cd4811f79e67d1eb5fb219ec93255b
-
SSDEEP
24576:AL8KjKjGFygcc23L1/NVOmOSGb6E3ecS4fzrjxJh9UZXlpbPvC7xtYUrEmFlo+L9:hKjKWQc2b1FVgbjrjxPe1pbPSQm1FloJ
Static task
static1
Behavioral task
behavioral1
Sample
cdf5f90c4bbf439beaf029a1361a5838bb70883062261e4d32a6ac4ceec9c3f7.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
cdf5f90c4bbf439beaf029a1361a5838bb70883062261e4d32a6ac4ceec9c3f7
-
Size
1.4MB
-
MD5
fe720d31ad7bce3787e1a1f700bb8c07
-
SHA1
9d9d23c9cd9ff0d11f9732ddf84aecb18c560305
-
SHA256
cdf5f90c4bbf439beaf029a1361a5838bb70883062261e4d32a6ac4ceec9c3f7
-
SHA512
5f20afd6ace0863d153d4a3166702206bda59a464f0348b3870b04fb00ba1a1b36a69e978f65e1b43829f3bf94c5ed2da4cd4811f79e67d1eb5fb219ec93255b
-
SSDEEP
24576:AL8KjKjGFygcc23L1/NVOmOSGb6E3ecS4fzrjxJh9UZXlpbPvC7xtYUrEmFlo+L9:hKjKWQc2b1FVgbjrjxPe1pbPSQm1FloJ
-
Modifies firewall policy service
-
Modifies Installed Components in the registry
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
7