General
-
Target
5693c9a9f64979f1f953066b69d6407ac45a5015748e35ab5911a96fe73ccf25
-
Size
218KB
-
Sample
240813-zh9sjsvfrh
-
MD5
7bb8525c3c8854cb45a81c0771358999
-
SHA1
a51eaae062e4953ca8b4443fa5ea332ecfd4eb62
-
SHA256
5693c9a9f64979f1f953066b69d6407ac45a5015748e35ab5911a96fe73ccf25
-
SHA512
e4c932980ab322fa0fc4cc593209a85a6ef999f9c20d1f7eafb6a906e3f0b42a62f19d88c27b3c7858a4cd90f6e517523ef788a4b509356a00ce9dcd71367ba2
-
SSDEEP
3072:7nz2z/jMwe8Mco9+qol6WpJ/HAU1n/4SpBG1HFkdj/LYbEWyWHAK2ew:+z/k+SWPIcn/4STIudrLAHAN
Static task
static1
Behavioral task
behavioral1
Sample
5693c9a9f64979f1f953066b69d6407ac45a5015748e35ab5911a96fe73ccf25.exe
Resource
win7-20240704-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
5693c9a9f64979f1f953066b69d6407ac45a5015748e35ab5911a96fe73ccf25
-
Size
218KB
-
MD5
7bb8525c3c8854cb45a81c0771358999
-
SHA1
a51eaae062e4953ca8b4443fa5ea332ecfd4eb62
-
SHA256
5693c9a9f64979f1f953066b69d6407ac45a5015748e35ab5911a96fe73ccf25
-
SHA512
e4c932980ab322fa0fc4cc593209a85a6ef999f9c20d1f7eafb6a906e3f0b42a62f19d88c27b3c7858a4cd90f6e517523ef788a4b509356a00ce9dcd71367ba2
-
SSDEEP
3072:7nz2z/jMwe8Mco9+qol6WpJ/HAU1n/4SpBG1HFkdj/LYbEWyWHAK2ew:+z/k+SWPIcn/4STIudrLAHAN
-
Modifies firewall policy service
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5