General
-
Target
5f2f2d17552b70f134ef36ebde5d345864cdcdc19972a5c1219505088cd49409
-
Size
1.5MB
-
Sample
240611-c4r4as1dld
-
MD5
e8f8f34da9ab9ee760338d50897fbe06
-
SHA1
0a888fe4569599a9f0d269ba88e11a9ff7600a17
-
SHA256
5f2f2d17552b70f134ef36ebde5d345864cdcdc19972a5c1219505088cd49409
-
SHA512
2a92850c4c8cd9316a05a4ca9f532ab9f5eca29354eef635bd3555ad1655301e0da5b0b8e72af14f1bdb3440a03e5c7699445b6a4efb010243fb59f932e55912
-
SSDEEP
24576:G/5aX4+oafoSpER/RaK/UxlxiWx0nH48HT+TKm2Lpy7ZQV0aywl8D7TRamX:G/wX4TptIQ4lxRxIT+TKNy7wl8FV
Static task
static1
Behavioral task
behavioral1
Sample
5f2f2d17552b70f134ef36ebde5d345864cdcdc19972a5c1219505088cd49409.exe
Resource
win7-20240508-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5f2f2d17552b70f134ef36ebde5d345864cdcdc19972a5c1219505088cd49409
-
Size
1.5MB
-
MD5
e8f8f34da9ab9ee760338d50897fbe06
-
SHA1
0a888fe4569599a9f0d269ba88e11a9ff7600a17
-
SHA256
5f2f2d17552b70f134ef36ebde5d345864cdcdc19972a5c1219505088cd49409
-
SHA512
2a92850c4c8cd9316a05a4ca9f532ab9f5eca29354eef635bd3555ad1655301e0da5b0b8e72af14f1bdb3440a03e5c7699445b6a4efb010243fb59f932e55912
-
SSDEEP
24576:G/5aX4+oafoSpER/RaK/UxlxiWx0nH48HT+TKm2Lpy7ZQV0aywl8D7TRamX:G/wX4TptIQ4lxRxIT+TKNy7wl8FV
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3