General
-
Target
d33560019a5a749077a47473ac2126024b84e9e5c921abeba05d254a2890fa07
-
Size
1.9MB
-
Sample
240526-jlm5ysbe9y
-
MD5
57a614bddd8c37ab617b41664a815eba
-
SHA1
190052ec8ffd96509731793b5f128eb3e18e0947
-
SHA256
d33560019a5a749077a47473ac2126024b84e9e5c921abeba05d254a2890fa07
-
SHA512
9399e6eddb056dbcf4921210309d010aad2f6f5bc5d678a7cd4bf0ecce38df3bcbb886014610800ebe93cccb454109c8bb133879f7d3845a56cd20399d76e222
-
SSDEEP
49152:j19XaNKmSjvoxpWucxAA22VdbqBOdlmHCU:j19XagmYQxpWuOPAOdIHD
Static task
static1
Behavioral task
behavioral1
Sample
d33560019a5a749077a47473ac2126024b84e9e5c921abeba05d254a2890fa07.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
d33560019a5a749077a47473ac2126024b84e9e5c921abeba05d254a2890fa07
-
Size
1.9MB
-
MD5
57a614bddd8c37ab617b41664a815eba
-
SHA1
190052ec8ffd96509731793b5f128eb3e18e0947
-
SHA256
d33560019a5a749077a47473ac2126024b84e9e5c921abeba05d254a2890fa07
-
SHA512
9399e6eddb056dbcf4921210309d010aad2f6f5bc5d678a7cd4bf0ecce38df3bcbb886014610800ebe93cccb454109c8bb133879f7d3845a56cd20399d76e222
-
SSDEEP
49152:j19XaNKmSjvoxpWucxAA22VdbqBOdlmHCU:j19XagmYQxpWuOPAOdIHD
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Pre-OS Boot
1Bootkit
1