General
-
Target
7d2880ae941c05d0887d84aee721c16c258ccb32b453f25f862cc09723c9e76b
-
Size
1.6MB
-
Sample
240524-jp8aasad78
-
MD5
e23a29daaedc8085cd4373910d72adc2
-
SHA1
4df7ce61932d47ae77dd1633fd370e942afa5c37
-
SHA256
7d2880ae941c05d0887d84aee721c16c258ccb32b453f25f862cc09723c9e76b
-
SHA512
7a71f8d2dd4471a7ea86409766f226bfea60ba30d407e69d279ffdb659f9f9db4fd95d41ac077e6d70324bacc8bc086ba4ec35e8d9a2d051cc7bb862fe89b9e3
-
SSDEEP
49152:rt8MGGGN/DJAyC4yHJvu/wRwAjGeRj5G2:J8MGGGZlAyCPVuMI
Behavioral task
behavioral1
Sample
7d2880ae941c05d0887d84aee721c16c258ccb32b453f25f862cc09723c9e76b.exe
Resource
win7-20240215-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
7d2880ae941c05d0887d84aee721c16c258ccb32b453f25f862cc09723c9e76b
-
Size
1.6MB
-
MD5
e23a29daaedc8085cd4373910d72adc2
-
SHA1
4df7ce61932d47ae77dd1633fd370e942afa5c37
-
SHA256
7d2880ae941c05d0887d84aee721c16c258ccb32b453f25f862cc09723c9e76b
-
SHA512
7a71f8d2dd4471a7ea86409766f226bfea60ba30d407e69d279ffdb659f9f9db4fd95d41ac077e6d70324bacc8bc086ba4ec35e8d9a2d051cc7bb862fe89b9e3
-
SSDEEP
49152:rt8MGGGN/DJAyC4yHJvu/wRwAjGeRj5G2:J8MGGGZlAyCPVuMI
-
Modifies firewall policy service
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5