General
-
Target
cda7dcba92b6479ecae68e92de6f900c38c61f4cda28e18c8210903a9eff50b1
-
Size
2.1MB
-
Sample
240517-rn6n3sbd7x
-
MD5
7132789b3afd31bbd8a9ca9fd05b190c
-
SHA1
b536d55d4a1eef0f144b788eec426dc3aa3f942a
-
SHA256
cda7dcba92b6479ecae68e92de6f900c38c61f4cda28e18c8210903a9eff50b1
-
SHA512
ae90cc1647ac0d064c6bea9f48d6cf2bee46df9c389ac39ca098bab6af0439648bfb807cd4576dea6f6bad007e1d824a4a0082676ec1168f98d55cd60ede92fc
-
SSDEEP
24576:tpzKTGA8fRfabohqemWaxxVWnU7CCGEqIGEdu11/gJH+6z4YfuHIpl:TKizfQO9axf6FCGE4TgJVz4K
Static task
static1
Behavioral task
behavioral1
Sample
cda7dcba92b6479ecae68e92de6f900c38c61f4cda28e18c8210903a9eff50b1.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
cda7dcba92b6479ecae68e92de6f900c38c61f4cda28e18c8210903a9eff50b1
-
Size
2.1MB
-
MD5
7132789b3afd31bbd8a9ca9fd05b190c
-
SHA1
b536d55d4a1eef0f144b788eec426dc3aa3f942a
-
SHA256
cda7dcba92b6479ecae68e92de6f900c38c61f4cda28e18c8210903a9eff50b1
-
SHA512
ae90cc1647ac0d064c6bea9f48d6cf2bee46df9c389ac39ca098bab6af0439648bfb807cd4576dea6f6bad007e1d824a4a0082676ec1168f98d55cd60ede92fc
-
SSDEEP
24576:tpzKTGA8fRfabohqemWaxxVWnU7CCGEqIGEdu11/gJH+6z4YfuHIpl:TKizfQO9axf6FCGE4TgJVz4K
-
Modifies firewall policy service
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5