General
-
Target
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d
-
Size
1.2MB
-
Sample
240526-mdg6hsff46
-
MD5
e17bf1770bab7aae01b11e7a3558f31a
-
SHA1
d00ec77c77c62118cad0f5658a976d0e0a88b467
-
SHA256
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d
-
SHA512
263c27108ed3a8f1fd50c8fe23ef2ae1166328046079a1d425c20823fc70b4ff1f6b7b4c284fd8980b1533b3d55deaa4afa1fec7c1049af1adaa3d46869e18fc
-
SSDEEP
24576:7qo1V4IDQ1rThff+r/ibJIRYP6h95C+VlLExqWXTHRyWtv4r6Ps:7qoTDerQKwC+vExqWXTxyWF4r6Ps
Static task
static1
Behavioral task
behavioral1
Sample
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d
-
Size
1.2MB
-
MD5
e17bf1770bab7aae01b11e7a3558f31a
-
SHA1
d00ec77c77c62118cad0f5658a976d0e0a88b467
-
SHA256
e71c744f4f9abc0b0807950ac1194a6d3f64d9f0f1eb7b391490b5ca1a16029d
-
SHA512
263c27108ed3a8f1fd50c8fe23ef2ae1166328046079a1d425c20823fc70b4ff1f6b7b4c284fd8980b1533b3d55deaa4afa1fec7c1049af1adaa3d46869e18fc
-
SSDEEP
24576:7qo1V4IDQ1rThff+r/ibJIRYP6h95C+VlLExqWXTHRyWtv4r6Ps:7qoTDerQKwC+vExqWXTxyWF4r6Ps
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5