General
-
Target
6dd0d011103e13faa3c66eb58a573c038ecbb5d7c50024eaac83c9c51a582e44
-
Size
1.1MB
-
Sample
240428-alswrsca6v
-
MD5
1f8ba18ffaa85b8281d42762776fe3f8
-
SHA1
c30a49489e86ff47bf12fa18312a7d5a41ad3f67
-
SHA256
6dd0d011103e13faa3c66eb58a573c038ecbb5d7c50024eaac83c9c51a582e44
-
SHA512
3d18ff791fa0dbf7fc8a8592221ee6ac29e9dd702f4f3c4083858b5a0048a164f963df29af25c93ed5f180cdb1b00811586f1e2253ceb4909898d618579035f8
-
SSDEEP
24576:ImPVGqnVpVaYfnhdzFZ7UA+jzw9NAQnA0G7WDtB:IoBtaYfhSA+jzaNAQA0GiD
Behavioral task
behavioral1
Sample
6dd0d011103e13faa3c66eb58a573c038ecbb5d7c50024eaac83c9c51a582e44.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
6dd0d011103e13faa3c66eb58a573c038ecbb5d7c50024eaac83c9c51a582e44
-
Size
1.1MB
-
MD5
1f8ba18ffaa85b8281d42762776fe3f8
-
SHA1
c30a49489e86ff47bf12fa18312a7d5a41ad3f67
-
SHA256
6dd0d011103e13faa3c66eb58a573c038ecbb5d7c50024eaac83c9c51a582e44
-
SHA512
3d18ff791fa0dbf7fc8a8592221ee6ac29e9dd702f4f3c4083858b5a0048a164f963df29af25c93ed5f180cdb1b00811586f1e2253ceb4909898d618579035f8
-
SSDEEP
24576:ImPVGqnVpVaYfnhdzFZ7UA+jzw9NAQnA0G7WDtB:IoBtaYfhSA+jzaNAQA0GiD
-
Modifies firewall policy service
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5