General
-
Target
1e6a09dc069ee429fb0df4ba085ea8c330b30970d6df846b9cfeffc74338b4e1
-
Size
1.1MB
-
Sample
240529-117lksce37
-
MD5
2c949ee6558f239c107cadb6fda3d297
-
SHA1
b2bb8b465ed3891e20c30a724875fb3fb3d29a8a
-
SHA256
1e6a09dc069ee429fb0df4ba085ea8c330b30970d6df846b9cfeffc74338b4e1
-
SHA512
d596e2de9fef0152087037a1b949d79c05dc305103b67ad13af4065ef01fcbbad6b3e7361311c95d31d61f110e4835109c5c426aef957ad4c502d08e5826e673
-
SSDEEP
24576:dJqtZ2F83eGiHKCsLnMpK5SFdtNc/enhABFlEXdkE+i/I:dJq62hCsDaHdtNcDEXdNXQ
Static task
static1
Behavioral task
behavioral1
Sample
1e6a09dc069ee429fb0df4ba085ea8c330b30970d6df846b9cfeffc74338b4e1.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
1e6a09dc069ee429fb0df4ba085ea8c330b30970d6df846b9cfeffc74338b4e1
-
Size
1.1MB
-
MD5
2c949ee6558f239c107cadb6fda3d297
-
SHA1
b2bb8b465ed3891e20c30a724875fb3fb3d29a8a
-
SHA256
1e6a09dc069ee429fb0df4ba085ea8c330b30970d6df846b9cfeffc74338b4e1
-
SHA512
d596e2de9fef0152087037a1b949d79c05dc305103b67ad13af4065ef01fcbbad6b3e7361311c95d31d61f110e4835109c5c426aef957ad4c502d08e5826e673
-
SSDEEP
24576:dJqtZ2F83eGiHKCsLnMpK5SFdtNc/enhABFlEXdkE+i/I:dJq62hCsDaHdtNcDEXdNXQ
-
Modifies firewall policy service
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5Pre-OS Boot
1Bootkit
1