General
-
Target
24a443922c0b86c48471c1a8e08595b0N.exe
-
Size
100KB
-
Sample
240712-cd89wstfrk
-
MD5
24a443922c0b86c48471c1a8e08595b0
-
SHA1
bd2affe29e6818d399d47e1415a6ae975fc2d6b2
-
SHA256
5d2661b6aa03442888f94946a075b0ce1ce9dab5f605fe169d05c122974045d2
-
SHA512
f00a4cef5f4a1b1e47e41a4eec1fc1738e0bfdadd3e3804cf9c2aa1a78bd90e80b68e3ac26b7f511c1dc9c82c7f5548942939a69dcdc0b2b09cc77ba4825efe5
-
SSDEEP
3072:V8t+T6XWTSqEsM6oyU8a7CTm1zBrXj/M7r:+t+T6XWTqsM6xU80BB/u
Static task
static1
Behavioral task
behavioral1
Sample
24a443922c0b86c48471c1a8e08595b0N.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Targets
-
-
Target
24a443922c0b86c48471c1a8e08595b0N.exe
-
Size
100KB
-
MD5
24a443922c0b86c48471c1a8e08595b0
-
SHA1
bd2affe29e6818d399d47e1415a6ae975fc2d6b2
-
SHA256
5d2661b6aa03442888f94946a075b0ce1ce9dab5f605fe169d05c122974045d2
-
SHA512
f00a4cef5f4a1b1e47e41a4eec1fc1738e0bfdadd3e3804cf9c2aa1a78bd90e80b68e3ac26b7f511c1dc9c82c7f5548942939a69dcdc0b2b09cc77ba4825efe5
-
SSDEEP
3072:V8t+T6XWTSqEsM6oyU8a7CTm1zBrXj/M7r:+t+T6XWTqsM6xU80BB/u
-
Modifies firewall policy service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5