General
-
Target
abc8df55f9d496b3b730ef513aaee87a696e291d6c6ebc738bf7f190787c92ba
-
Size
3.6MB
-
Sample
240517-y432fshb9w
-
MD5
f716a75486c6cd6d5e1af6081812a31f
-
SHA1
3eb157a2a0f03567eec9c45965c6128964ffef3f
-
SHA256
abc8df55f9d496b3b730ef513aaee87a696e291d6c6ebc738bf7f190787c92ba
-
SHA512
e29b2ce10c21224fcfab191edf6d191fb622aa64543e88bfd431f5cb9dd56c52832c9e5e8c08cc52cba3e5edc0512c05218c4ec65b08f0558df02be3dae812da
-
SSDEEP
49152:0CP4e9e3+eDLZRo4CxqvIGf4amGCO0E7I2MK3sN9qcKP/hrwjRFnwEZfHewK6pyQ:1F9qvorAICmZYSKcNghCTnjIQ
Static task
static1
Behavioral task
behavioral1
Sample
abc8df55f9d496b3b730ef513aaee87a696e291d6c6ebc738bf7f190787c92ba.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
abc8df55f9d496b3b730ef513aaee87a696e291d6c6ebc738bf7f190787c92ba
-
Size
3.6MB
-
MD5
f716a75486c6cd6d5e1af6081812a31f
-
SHA1
3eb157a2a0f03567eec9c45965c6128964ffef3f
-
SHA256
abc8df55f9d496b3b730ef513aaee87a696e291d6c6ebc738bf7f190787c92ba
-
SHA512
e29b2ce10c21224fcfab191edf6d191fb622aa64543e88bfd431f5cb9dd56c52832c9e5e8c08cc52cba3e5edc0512c05218c4ec65b08f0558df02be3dae812da
-
SSDEEP
49152:0CP4e9e3+eDLZRo4CxqvIGf4amGCO0E7I2MK3sN9qcKP/hrwjRFnwEZfHewK6pyQ:1F9qvorAICmZYSKcNghCTnjIQ
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5