General
-
Target
ae63782bf8c05d37c40b60f81c434110N.exe
-
Size
593KB
-
Sample
240814-mcq22a1gpm
-
MD5
ae63782bf8c05d37c40b60f81c434110
-
SHA1
8460bf60c5ab351c8928ed5d42ee22b73adba9c1
-
SHA256
ef55ce30aabffe687b092eb15edb8ddc48d3b532c2e6b0e16ee5152c3be2c80b
-
SHA512
b7f04116f0c3ab1af395caee8a483737e9dc84cb30489319d07e7933431fa46eabebe7e4aa5ce8269efe41e5a75803335ce787c828d03c769d19250a8f3072ac
-
SSDEEP
12288:HrMIztyCK5x8CBmn+RrNbEyWYa0Ie1vUxMV7BpDuR:pZyCA8CBmn+RrNj9ay5pVpDuR
Static task
static1
Behavioral task
behavioral1
Sample
ae63782bf8c05d37c40b60f81c434110N.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ae63782bf8c05d37c40b60f81c434110N.exe
-
Size
593KB
-
MD5
ae63782bf8c05d37c40b60f81c434110
-
SHA1
8460bf60c5ab351c8928ed5d42ee22b73adba9c1
-
SHA256
ef55ce30aabffe687b092eb15edb8ddc48d3b532c2e6b0e16ee5152c3be2c80b
-
SHA512
b7f04116f0c3ab1af395caee8a483737e9dc84cb30489319d07e7933431fa46eabebe7e4aa5ce8269efe41e5a75803335ce787c828d03c769d19250a8f3072ac
-
SSDEEP
12288:HrMIztyCK5x8CBmn+RrNbEyWYa0Ie1vUxMV7BpDuR:pZyCA8CBmn+RrNj9ay5pVpDuR
-
Modifies firewall policy service
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5