General
-
Target
71aaf2e975b8a4db7c5cf9151a2c0e6b4d6bbf6743ce65354f98ce3dc5630506
-
Size
1.5MB
-
Sample
240611-d58ccatcqn
-
MD5
3c963e344332202b01fdd59f76aef55f
-
SHA1
b4e2600e302fe7406a3a412d5e1c88e5abe82633
-
SHA256
71aaf2e975b8a4db7c5cf9151a2c0e6b4d6bbf6743ce65354f98ce3dc5630506
-
SHA512
7f52de8d493688cf5fe5aca647151500b6012e124a1daf1e25b4396ed394a0ee87d07975a0642bd6a593bbebc4478eba85fd18b10bba52af17b7f481a1263348
-
SSDEEP
24576:24tajg6LiHO1BcP+Wu7kXD2JNBg9Z3IWggggM0qTp6MGrMehBPqXbdGaD+lk0cQG:24I8BLmf4XKXBgXggggMUZ4eTUbdGa6a
Static task
static1
Behavioral task
behavioral1
Sample
71aaf2e975b8a4db7c5cf9151a2c0e6b4d6bbf6743ce65354f98ce3dc5630506.exe
Resource
win7-20240221-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
71aaf2e975b8a4db7c5cf9151a2c0e6b4d6bbf6743ce65354f98ce3dc5630506
-
Size
1.5MB
-
MD5
3c963e344332202b01fdd59f76aef55f
-
SHA1
b4e2600e302fe7406a3a412d5e1c88e5abe82633
-
SHA256
71aaf2e975b8a4db7c5cf9151a2c0e6b4d6bbf6743ce65354f98ce3dc5630506
-
SHA512
7f52de8d493688cf5fe5aca647151500b6012e124a1daf1e25b4396ed394a0ee87d07975a0642bd6a593bbebc4478eba85fd18b10bba52af17b7f481a1263348
-
SSDEEP
24576:24tajg6LiHO1BcP+Wu7kXD2JNBg9Z3IWggggM0qTp6MGrMehBPqXbdGaD+lk0cQG:24I8BLmf4XKXBgXggggMUZ4eTUbdGa6a
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3